10 Technical Questions What Every Parent Must Do to Keep Children Safe Online
Dec 17, 2011Spyware, online fraud, and other Internet threats are certainly not new. But they are growing more sophisticated and criminal every day.
So how can you protect your children against these online dangers? And how can you provide a safe, appropriate Internet environment in the face of online criminals who know more about technology than you ever will?
Fortunately, there are good answers to these tough questions—thanks to a large, capable group of people and resources dedicated to helping you keep the Internet safe. With only a little effort on your part, you can educate yourself...
Tap into the world’s best resources for finding, monitoring, and defending your children against online threats... And start using the Internet more safely and confidently.
Norton Internet Security 2012 final version
Sep 8, 2011On September 7, Symantec launched Norton AntiVirus and Norton Internet Security 2012, which are designed to improve on their already industry-leading benchmarks for protection and performance, while enhancing the overall user experience.
Key technologies of Norton Internet Security 2012:
- Online identity protection
- Antivirus
- Antispyware
- Parental controls management
- Social network protection
- Browser protection
- Phishing protection
- Smart firewall
- Network mapping and monitoring
- Antispam
- Worm protection
- Rootkit protection
Symantec Intelligence Report: July 2011
Jul 26, 2011With one in 280.9 emails identified as malicious in July, further analysis reveals a significant increase in activity related to what may be described as an aggressive and rapidly changing form of generic polymorphic malware (polymorphic malware may have many variations of the same code using different encoding techniques, but the functionality of the program remains the same in each version). This rise accounted for 23.7 percent of all email-borne malware intercepted in July; more than double the same figure six months ago, indicating a much more aggressive strategy on the part of the cyber criminals responsible, perhaps greater use of automation has enabled them to increase their output to this extent.
In the same time frame, the number of variants, or different strains of malware involved in each attack has also grown dramatically by a factor of 25 times the same quantity six months previously; an alarming proliferation in such a short time almost certainly heightens the risk profiles of many organizations as these new strains are much harder to detect using traditional security defenses. This new breed of malware is likely to be causing a great deal of pain for a great number of traditional anti-virus companies that rely on signatures, heuristics and software emulation in order to detect malicious activity.
How to Login to Norton Account
Feb 18, 2011If you are not familiar with the Norton Account, first of all I want to note that My Norton Account is a free online „service”, through which everyone can get the latest product updates, access online features and services, protect additional computers, view Norton Product Keys and benefit from various special offers for Norton customers only.
Norton Account includes the following features:
- Products — View all of your registered Norton products and services;
- Order History — View details of your online orders, including order status, payment status, amount paid, and the Norton products and services purchased.
- Profile — Keep your personal and billing information up-to-date by editing your Profile.
- Change Password — Maintain your Norton Account security by periodically changing your password.
- Special Offers — Take advantage of promotions, discounts, and special offers that are provided to Norton Account holders.
Network security threats
Dec 14, 2010As you probably know, the main objective of security software is to protect and ensure the safety of information, computer systems or computer networks from theft, vandalism, damage, loss and other potential hazards. Of course, security software is not the only solution to protect a computer system, but in my opinion, namely security software plays a crucial role in securing and maintaining the confidentiality of personal computers.
I think the problem is that unlike the corporate computers, personal computers are not adequately protected against Internet threats, since not all users are good professionals in the field of information security, often ignored the rules of computer security and many other security flaws that are not present in corporate networks. And if, in most instances for corporate computers the main threat are insiders, then for personal computers — Network security threats.
As a rule, to protect personal computer against Network threats helps security software, such as antivirus, anti-spam, firewall, anti-spyware and others — as multi-application security suite or standalone software. And despite the fact that this class of programs provides a malware, spyware, phishing, spam and vulnerability protection, they cannot protect against these threats if the user does not comply with the rules of computer security and ignores the recommendations of experts.
Targeted scam threatening DDoS attacks
Aug 17, 2010In a typical 419 scam message, we usually see lottery winning notifications, mentions of next of kin, or fake business offers. Often we observe spammers creating fake stories tying in with disasters or news linked to users' emotions. In a recent targeted scam tactic, spammers have created a fake story threatening users about a DDoS attack on their website.
In this latest spam campaign, the spammer claims to be a hacker owning a huge network capable of a DDoS attack, and threatens users that their website will be brought down with a DDoS attack if they fail to shell out 200ドル. The domain name mentioned in the spam message is legitimate and its registrant dates are old. There are intentional spelling mistakes in the message in an effort to evade content-based antispam filters.
Symantec has recently observed phishing websites spoofing courier service brands
Symantec has recently observed phishing websites spoofing courier service brands. There were primarily three brands targeted and fraudsters were attempting to steal customers’ login credentials.
So what’s in the login credentials of courier service brands that fraudsters can take advantage of? Couriers provide their customer with several online features upon registering with the brand’s legitimate website. The features help customers to track their shipments, make online payments for their orders, specify the address for delivery, and so on. If login credentials are stolen, fraudsters can benefit from these features because it may enable them to reroute valuable packages to any address they provide.
In one of the phishing sites, the page prompted the customer to update user details, purportedly because "the account had not been updated for a considerable time." The details that required updating included sensitive information such as login credentials, account name, account number, and billing address. When the requested information is entered, the page redirects to the legitimate website, which creates the illusion that the update is complete. If customers fall victim to these phishing sites, they may end up losing their customer identity with the courier, which would — at the very least — result in the failure of having their packages delivered to the recipients.
Norton Safe Web for Facebook helps protect you and your computer
Aug 15, 2010To take advantage of this feature, click on the "Enable Auto-Scan" button on the scan summary page to have Safe Web check your News Feed for malicious links every hour and notify you if unsafe links are found.
It’s FREE. It’s effective. And it makes your experience on Facebook safer. The Norton Safe Web for Facebook application scans your news feeds and identifies URLs containing security risks such as phishing sites, malicious downloads and links to unsafe external sites. With this application, you can easily see which links in your News Feed are unsafe for you or your friends to click on. From the scan results page you can click through to view detailed site rating analysis on the Norton Safe Web site (http://safeweb.norton.com/).
Facebook Bieber Fans Targeted by Scammers Again
Scammers are trying to exploit the millions of Justin Bieber fans using Facebook by making false claims about their idol in order to lure them onto rogue pages.
The fake messages being posted by users who already fell victim to this scam read: "OMG Justin Bierber trying to flirt, check it out http://tiny.cc/[censored].
The tiny.cc link takes users to a rogue Facebook application page which displays a big button reading "Justin Bieber going crazy! Click to see".
Black Hat 2010: Security industry best practices
Aug 14, 2010Following an industry conference, I find it a good practice for me to reflect back on what I learned and observed and see how I can apply it to my current work. At the conference there is so much to learn and take in, so I find it helps to let it all marinate for a bit of time and then I can start to uncover the new learning once I’m back at my desk and away from the conference buzz. It’s now been nearly two weeks since BlackHat wrapped up and these are the topics and observations from the conference that have been swilling around in my head. I hope to explore these thoughts more with my industry colleagues and find my way to contribute to improving security industry best practices.
Fraudsters provide false security for Facebook users
Aug 10, 2010In August 2010, Symantec observed a phishing website that targeted Facebook login credentials, which claimed to provide security to Facebook users. The page was not imitating the legitimate Facebook website, but appeared to be an alternate website that provided this facility. The phishing site was titled as a “Security and Privacy Update” website.
The page stated that Facebook users were vulnerable to threats such as spam messages or hackers that could cause problems with their user profiles. The page further stated that if users confirmed their identity by providing login details, then they would be safe from such threats. On the contrary, if a user gave up their login details to the phishing site, the fraudsters would have succeeded and could steal the details for use in future attacks.
Deleting entries from your Autofill Exclusions list
Jul 19, 2010If you decide to autofill a Web page that you excluded, you can remove the Web page URL from the Autofill Exclusions list.
Specify Autofill exclusions
Jul 14, 2010Identity Safe offers to automatically fill in your logins on those Web pages for which you have saved the logins. However, you can configure Identity Safe to not use logins and cards to automatically fill details in a Web page.
Autofill Exclusions
The Autofill Exclusions feature lets you view the Web pages for which you asked Identity Safe to not save your logins or automatically fill forms. Identity Safe remembers your decision and does not prompt you to use the logins or cards that are available in Identity Safe.
When you do not want Identity Safe to automatically fill the details, you can use Do not Autofill this page option. This option is available in the Cards & Logins menu on the Norton Toolbar.
Manage Notes
Jul 13, 2010Identity Safe stores and manages your sensitive information. It becomes difficult to manage all of the identity numbers that you use when you browse the Web. Manage Notes stores all your sensitive IDs in a very secure way and lets you use them easily when you are online. Use Manage Notes to include information such as social security number, drivers license number, insurance policy number, and legal and financial information.
You can use Manage Notes to store your personal information, which you can retrieve and use when needed. You can use this information to fill out Web site registration forms. You can also view, edit, and delete the notes that you have saved.
Editing, deleting, or duplicating cards
Jul 6, 2010All the cards that you have saved in Identity Safe are listed in Manage Cards. You can select, view, duplicate, and edit the details of any card that you created. You can delete a card if it is no longer needed. You can also duplicate a saved card and change only the fields that you want to change.
You can view a summary of the card that you created. You can select any of the cards that are present in the list of cards at the bottom of the Manage Cards window. When you select a card, you can view a summary of the card.
When you create, duplicate, or edit a card, the card's region is set to the user's default region. If you browse to a Web page other than the default region and use the card on that form, the fields may not fill correctly. For example, your card has a default United States region but you are on a France Web page. In this case, you must use the card with France as the region to fill the Web page form.
Adding cards
The cards in the Manage Cards window help you to automatically fill forms on Web sites with a single click. You can create cards to store information, such as personal details, contact details, and credit card details. You can provide a card name to help you identify a specific card.
If you have more than one credit card, you can create multiple cards with different sets of information. When you visit a transactional Web site, you can provide the credit card details that are present in any of the cards that you created.
You can also create anonymous cards for use on unfamiliar Web sites where you may be uncomfortable providing your personal information. You can automatically fill online forms when you visit a Web site.
Manage Cards
Manage Cards lets you manage your personal information such as name, date of birth, email address, and credit card information in one place.
- Automatically fill forms
- Provide sensitive information without having to type it while you are online
Update the password for a login
Good security practice requires that you regularly change the password for a login. You can keep your login credentials in Identity Safe updated every time you change your password for a Web page. The updated information is automatically filled the next time you visit that login's associated Web page.
You can also update your new login information in Identity Safe when you are on the Web page. Identity Safe asks you if you want to update your logins.
Change the user name and password
Jun 27, 2010When you change your login ID for a Web page, Identity Safe lets you change the user name in Manage Logins. After you change the login ID or user name, the new user name appears when you revisit the login Web page.
In addition to changing the user name, you can also change the login password.