Sunday, 13 October 2019

What are the Internet Safety rules to keep our devices safe ?

10 Internet safety rules to help keep your family safe online



Today’s children are able to access more information than any generation before. Thanks to the Internet we all now have a wealth of information that can enrich our lives in new and wondrous ways. Yet, the Internet also has the potential to harm us and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real.

Here are 10 options for protecting your family’s devices so they can go online without worry.

  1. Realize cybersecurity is a moving target.

    Cybercriminals are constantly coming up with new threats, so you need to be conscientious about downloading the latest security updates and patches and watching the news for any breaking threats.
  2. Get wise to phishing.

    You may be sophisticated enough to know not to click on a URL that’s supposedly from your bank or a friend, but does everyone in your household? Tell your kids about phishing and warn them not to click on URLs from an email or social network message. Get a security program that recognizes and blocks dodgy URLs.
  3. Watch out for scams.

    There are other ways to trick you into entering information. Even some so-called legitimate businesses can trick you into signing up for recurring annual payments and the like. Watch your credit card statements closely.
  4. Use a password management system.

    Passwords are the primary defense against hackers for most people and it’s no secret that it’s often a flimsy one. Bolster your defense with a password management program. Best of all, this way you only need to remember one password.
  5. Keep social networks secure.

    There’s a good chance that at least one person in your house is on a social network. Unfortunately, social networks have become a draw for cybercriminals. Keep a close eye on your friends’ social network accounts. If someone messages you who hasn’t done so in a while, then be suspicious. Your friend’s account may have been hacked.
  6. Identify the threat in your household.

    Your home Wi-Fi network is another entry point for hackers. Make sure you have a hard-to-crack password and consider security software that identifies “intruders” on the network. Also stress the importance of avoiding public Wi-Fi networks to your kids.
  7. Educate kids about online safety.

    When it comes to cybersecurity, kids are often the weakest link. Get security software that keeps kids from clicking on the wrong links and visiting the wrong sites. Teach kids about suspicious activity online and encourage them to ask for help if something seems suspicious.
  8. Don’t forget mobile devices.

    Your phone and tablet need as much security protection as your PC. Make sure you’ve got a full security solution that covers your mobile devices as well. Put a passcode on your tablets and phones, too.
  9. Use a credit card.

    Credit cards are insured, so use that rather than your debit card.
  10. When in doubt, call support.

    The best security software programs offer 24x7 support. If you ever have any suspicions you’ve been hacked, call for help. Norton Security can help you buy peace of mind without sacrificing your family’s ability to learn and stay connected. It’s your single solution that protects up to five of your devices, whether it’s your desktop, mobile or tablet. And it’s incredibly intelligent — actively providing protection at all times, detecting online threats before they hit, so, when the new school year comes, your family will be ready explore new discoveries.



What are some of the ransomware: dos and don'ts to keep in mind

Ransomware: 5 dos and don'ts A Person Should Keep In Mind For The Security Purpose




A well-known form of malware, ransomware ruthlessly holds a computer’s data for ransom via encryption. If the user doesn’t pay the cybercriminal a certain amount of money within a certain amount of time, their data will be lost forever.
In this particular case, WannaCry demands that users pay a $300 ransom in bitcoin. If the user does not pay within three days, the amount will be doubled. If payment is not made within a week, the files will be deleted.
Security researchers caught on to the threat quickly and have made attempts to curb its infection rate. Unfortunately, this malware not only spreads itself rapidly, it also evolves quickly to avoid any attempts at mitigation. According to Europol, in just the short time since it was first discovered, the outbreak has increased to more than 200,000 users in 150 countries.
This ransomware threat is still very active on the internet, and you should take immediate care in order to not become one of its victims. Be sure you are using and updating security software in order to stay protected from the latest discovered versions of this ransomware. Patches have already been released by Microsoft, including patches for previously unsupported operating systems (XP, 2K3, Windows 8).
Additionally, once you are sure your computer is clear of infection, perform a backup of your hard drive. After you have completed the backup, be sure you have unplugged your hard drive from the machine for safe storage.
As of 05/14, Symantec Security researchers have collected a large number of new samples and are currently trying to identify the new and emerging versions of this malware. Norton products cover a large number of these newly discovered samples, including Ransom.Wannacry.
The VERY first thing you should do is update your computer’s operating system. Patches are being released for this particular variant of malware.
For more long-term prevention of ransomware attacks, follow these ransomware tips for businesses and consumers:
  1. New ransomware variants appear on a regular basis. Always keep your security software up to date to protect yourself against them.
  2. Keep your operating system and other software updated. Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
  3. Email is one of the main infection methods. Be wary of unexpected emails, especially if they contain links and/or attachments.
  4. Be especially wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
  5. Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However, organizations should ensure that backups are appropriately protected or stored offline so that attackers can’t delete them.
  6. Using cloud services could help mitigate ransomware infection, since many retain previous versions of files, allowing you to “roll back” to the unencrypted form.
Here are some other helpful things to keep in mind from Kevin Haley, director, Symantec Security Response.
Ransomware is an online form of the bully’s game of keep-away. Here, the bully gets on your computer and takes your personal files: documents, photos, financial information, all the things you care about. Those files are still on your computer, dangling in front of you, but they are encrypted now, useless to you. In order to get them unencrypted, you’ll need to pay the bully 300-500 dollars.
This is the fastest growing crime on the internet. It grew by 4500% in 2014, and shows no signs of stopping, it's just too profitable for the bullies. How do you stop the bullies? There are five things that will make a tremendous difference.

Five Simple Dos and Don’ts:

  1. Don’t pay the ransom. I can hear someone asking, “But won’t you get your files back if you pay the ransom?” Just like a bully who tires of the keep-away game, you likely will get your files back if you pay. But you may not. Sensing a sucker on the hook, you might get asked to pay again and again. But let’s say you’ve got an honest thief, one willing to unlock your files if you pay. Why would you ever give money to a crook? Especially one who will use the money to fund playing bully to a host of other people? It just doesn’t seem right to me.
  2. Don’t click on attachments in email. There are a lot of different gangs running ransomware scams, who use different ways to try and infect you. One of the most popular is using spam. The email could be saying there was a package for you that couldn’t be delivered. Or a cool screensaver that you should install. Whatever the con, the bad guys want you to click on an attachment to install the malware. Don’t do it. Just don’t click.
  3. Do keep software up to date. The bad guys know about weaknesses in the software on your PC before you do. And they try to use them to get on your machine. It's called exploiting a vulnerability. Patching removes the vulnerability. If you’re asked if you want to update your software – Do. It. Now. Waiting only helps the bad guys.
  4. Do use security software. If you have a friend who is a security expert, who spends 24/7 keeping up on all the latest malware threats and watches over your shoulder whenever you are on your computer, you’ll be pretty safe on the internet. Otherwise, get good security software to do that. Make sure it is more than Anti-Virus. I recommend Norton Security.
  5. Do back up. No one ever thinks anything bad will happen to them, until it does. I sure hope you never have ransomware infect your machine. But if it ever does, wouldn’t it be nice to have a copy of all your files somewhere safe? You can tell the bully where to get off. Everyone knows they need to back up their files. Now you have one more very good reason to do it.
These ransomware bullies are preying on us. But just by following a few simple dos and don’ts we can protect ourselves from them. And protect ourselves from all the other malware bullies out there.

Regards


Shawn H Parker


How to make your ipad and tablets secure with step by step instructions

How to secure your iPad and keep it that way




iPads and other tablet computers are everywhere: in the coffee shop, at your children’s school, at your book club, at the department store. Chances are, you or someone you know uses a tablet computer regularly. But should you be worried about security? Are tablet computers like the iPad any less secure than a standard laptop?



Although iPad devices are safer than most, their popularity makes them an attractive target for would-be cybervillains. Since Apple has made a point of building a lot of privacy features into all of their devices and operating systems, why not use them to your advantage?
Do make the most of Touch ID, which combines convenient one-touch access with biometric security.
Do make sure you’re using a good lock screen passcode.
Do pay attention to your surroundings, and change your privacy settings accordingly. For example, if you’re concerned about privacy and security while you’re sitting at the airport, consider disabling notification center, control center, and Siri from your lock screen. (Don’t worry, you’ll still have Touch ID for quick access).
Do a little research about how two-factor authentication may provide your iPad and your digital information with an extra level of security.
Don’t take your browser history privacy for granted. Consider Norton Secure VPN, which lets your encrypt your personal information and doesn’t track or store your online activity or location.
Don’t share your location information, just because the app asks for it. One good way to secure your information (and save some battery life) is to go to Settings > Privacy > and turn off location for all apps you don’t use regularly.
Do use good, strong passwords, and change them regularly. It may be a good idea to invest in a password manager to help you keep track.
Do be sure to promptly download and install any updates for your device’s operating system.
Don’t install any apps that override your device’s operating system (also called “jailbreaking”). Not only will these apps break much of your device’s built-in security, but you’ll void your device’s warranty.
Do make sure “Find My iPad” is enabled on your device. This feature allows you to locate and remotely wipe your iPad if it’s ever lost or stolen.
With these best practices, you’ll be able to securely enjoy the entertainment and convenience of your iPad, no matter where you happen to be.

Don’t wait until a threat strikes.

Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device – like most of us do – you need an all-in-one security suite. Meet Norton Security Premium.


Regards

Shawn H Parker



What are 10 benefits of VPN you might not know about

10 benefits of VPN you might not know about



A VPN or virtual private network can be key to achieving online privacy by cutting out eavesdroppers like hackers, your internet service provider, or governments.
A VPN connection encrypts your online activities and helps keep you safe on public Wi-Fi networks in places like coffee shops.
At a basic level, VPNs provide two key benefits.
  • Privacy — by masking things like your IP address, location, and search history, to keep them from being tracked by websites, internet browsers, cable companies, internet service providers (ISPs) and others.
  • Security — by helping protect you from anyone trying to access your personal information and other data you send and receive.
But that’s not all a quality VPN client can offer.
Keep in mind it’s important to first check your service agreements and applicable laws in your region to make sure these benefits can apply to you.
That said, here are some of the benefits you may be missing out on even if you’ve already got a VPN service. Some of the benefits can also help protect your business.

Assert your right to online privacy

Websites and apps can constantly track your activity, analyzing the data they collect. A VPN prevents web browsers and others from accessing your data, helping to keep your information anonymous and secure. Some VPNs also offer military-grade 256-bit encryption of your data.

Escape data-throttling

With a VPN, not only will your data be free from the prying eyes of ISPs and others, but you also won’t be subject to a data cap. ISPs can place caps on data to maximize Internet speed for some of their customers.

Escape bandwidth-throttling

If you’ve experienced slower internet speed on certain websites and at different times, you may have experienced bandwidth throttling. ISPs — or anyone with administrative controls over your network — might be responsible for the slowdown. A VPN can help. It can thwart such sluggishness by encrypting your device’s internet traffic. This prevents anyone on the network from seeing the content of your web traffic and disguises its destination.

Access region-blocked services like Netflix*

Some VPNs may be able to access geo-blocked content such as Netflix and other providers. How? A VPN can change your IP address to make a content provider think you’re browsing in another country that allows access. Note: Always check your service agreements to find out what’s permitted and follow those guidelines.

Avoid censorship when traveling abroad*

Some VPNs can help you bypass geographical restrictions. For instance, some countries restrict or forbid access to certain websites such as social media platforms or censor certain content. A VPN, however, may help grant you access by making your traffic look like it’s coming from a different location. It is the user’s responsibility to identify whether their use of a VPN is legal or not, and to check the country’s laws before using a VPN.

Access regional sports coverage unavailable in your location*

VPNs can help give you access to sports coverage that’s geographically restricted. For instance, a television network such as NBC may not be available for viewing if you’re outside the United States. A VPN may be capable of making viewing possible. Even so, check your streaming service agreement for its Terms of Service, and also be mindful that some countries may have penalties for using VPN to circumvent its rules.

Offer cheaper leased-line alternatives

A VPN can offer certain savings for businesses, in particular. For example, through VPNs, businesses could bypass renting expensive network capacity lines that achieve connectivity between office locations. Instead, they could connect via public infrastructure through cheaper local leased lines or broadband connections through a local ISP.

Offer cheaper long-distance telephone charges

A VPN can reduce long-distance phone charges. For example, instead of connecting via remote access servers and dial-up networks to access a company's intranet, you could connect to your local ISP access point.

Provide network scalability

As organizations grow, so do the costs of building a dedicated private network. Internet-based VPNs allow businesses to tap into network lines and network capability already available, giving remote and international locations in particular better reach and service quality.

Reduce support costs

Using a VPN can help reduce the cost of maintaining servers, because support can be outsourced to third-party service providers--that can support a lower cost structure due to their many clients.

Choosing a VPN

There are a lot a VPNs on the market. The best VPN? That’s will depend on your needs and what you want to pay. Free VPN services may not offer all the features you need, and some services may offer free service in exchange for access to your data.
Here’s the choice. If VPN providers don’t charge user fees, they may pay for their costs through advertising or from gathering and selling your data to third-parties.
Choosing the right VPN for you might mean paying for one, if you value your online privacy.
Remember, a VPN gives you the ability and control to add additional layers of online privacy and security to your online activities.
If you’re considering VPN providers, consider Norton Secure VPN. It offers an easy-to-use and secure private network that will help keep your personal information and data safe from cybercriminals and anyone else who might attempt to intercept your data.
Once you’ve chosen a VPN that’s right for you, you can start enjoying some of the benefits of VPN you might not have known about — that is, before reading this article.


How to delete your search history and maintain privacy with a virtual private network (VPN)

How to delete your search history and maintain privacy with a virtual private network (VPN)

Most of us use search engines every day. But did you ever stop to wonder what happens to your search histories?
By law, internet service providers (ISPs) can sell your browsing histories.
If you value your privacy, then keep reading to learn how a VPN can help hide your IP (internet protocol) address, keeping your identity anonymous while you search the web.

Can you truly clear your search history?

Whether you’re looking up something online or communicating via social media, you’re leaving digital footprints in the form of your browsing history, cookies, and cached data.
If you don’t want others seeing what you’ve been doing, a good first step is erasing this data whenever you close your browser.
To clear your search history, you can go to the tools menu in your search engine, select the history tab, and clear your browsing history. Browsers in the Windows operating system also have a keyboard shortcut, Control-Shift-Delete, that calls up a dialogue box allowing you to clear your browsing history.
What gets deleted? Sites you’ve visited, terms you searched for, cached images and other media content, cookies, a list of files you’ve downloaded from the web, and any data you’ve entered on forms.

Does deleting your web search history give you true privacy? No.
You’re removing the file references from your directories, but your operating system won’t simultaneously erase this data. It only moves the information to a special area on your PC’s hard drive.
That means any hacker or other third party could potentially recover these files using file recovery tools that are available for free on the web.
But that’s not all. Your IP address can still be collected while you’re browsing, which enables your ISP, the government, and other third parties to track what you search, visit, and download.
To address this, another best practice would be to use a reputable virtual private network (VPN), which can help hide your IP address and encrypt your traffic.
If you use a VPN, third parties will only be able to see the IP address of the remote VPN, which disables them from pinpointing your location and getting access to your browsing history for profiling, advertising, and tracking purposes.

Your search history isn’t private: A VPN can help

Without the right protection, your search history and other personal information could become public. A VPN can offer two key layers of protection.
One is privacy — by blocking websites, Internet browsers, cable companies, ISPs, and others from tracking your data and browsing history.
The other is security — by protecting you from those trying to access and capture your personal information and other data.
A VPN can not only can hide your real IP address and location, but also encrypt the personal information you send and receive across a public or shared network to help maintain your privacy and security.
This VPN protection could be particularly important now because ISPs do not necessarily need your consent before sharing — and selling — your browsing data and app activity.
Abiding by the rules, ISPs will let you opt out of policies that collect non-sensitive information to market to third parties. But they may not necessarily give you this opt-in consent with regard to using your data for first-party marketing.
While an ISP may not be able to use sensitive data to identify you, they can still create a consumer profile of you and sell that profile to advertisers, which leaves you vulnerable to being targeted with ads.
ISPs track things like the websites you visit, content you view, the device you use, and your location. ISPs can create consumer profiles that let companies know how best to target you with their message.
This gives ISPs a lot of power, because, unlike Google, an ISP knows your location by default. Pairing this with the other data gives them a lot of information to sell.
It’s a good idead to stay current with your own ISP’s privacy rules and updates — and opt out whenever you can.

What does a VPN hide?

Even if you use a private browsing mode, your IP information can still be collected. A VPN can help hide most of your online activities, most notably your IP address and location.
How? With a VPN, your online activities are anonymized and protected because the VPN masks your IP address and encrypts your data throughout the transmission. Some VPNs offer military grade 256-bit encryption.
Instead of sending information directly from your IP address, by using a VPN service, the VPN server’s IP address is the one associated with your activity. If your VPN service provider has servers around the world, you could appear to be connecting to the Internet from Berlin when you’re actually in Mumbai.
A special anonymization service like Tor, or “The Onion Router,” also can help by sending your encrypted and re-encrypted data through several random nodes on the internet, creating a circuitous route.
It’s similar to how you might try to throw someone off your trail in a game of hide-and-go-seek — by taking a hard-to-follow route and erasing your footprints.
Because the various nodes only know the IP address from the node before and after, none of the nodes knows the complete pathway the data takes.
Plus, each completed pathway is only valid for 10 minutes, and then Tor generates new random paths. However, your data is not encrypted at the exit node.

What’s an IP address?

What role does your IP address play in identifying your location?
Every computer has an IP, which is a unique address that identifies your device on the Internet or a local network. An IP is like a cyberspace mailing address, telling other computers where to deliver the data you seek.

What information can you get from an IP address?

Why is protecting your IP address so critical? Another’s knowledge of your IP address can leave you vulnerable, because it’s the key data that connects you to your location, ISP, and web search history.
To start, your IP address can share sensitive information about you that includes your physical location: city, state, ZIP code, and country. And it’s specific. Your IP address at home will be different than your IP address at your local coffee shop.
Your IP address also can be traced back to your ISP, which can then reveal more data, including information like your name, home address, phone number, credit card number, and browsing history.
As well as leaving you with a lack of privacy, third parties such as companies, ISPs, and cyberthieves could sell this sensitive information to others, who may use it for advertising or illegal activities such as financial fraud and identity theft.

What other information does a VPN hide?

When you surf the web, web browsers store that data and can use it to tailor your future search results. A reputable VPN can make tracking your online activities and gathering your data more difficult by hiding your IP address and encrypting your network traffic.
A VPN also can hide other types of information that would put your privacy at risk. Here’s a look at some of the other benefits of using a VPN.

Browsing habits

You can clear your cookies and search history from your browser, but chances are your information has already been recorded by your ISP or the websites you’ve visited. In addition to masking your IP, a VPN can hide what you do in your browser, including the search terms you enter on Google and the URLs you type in, and the websites you visit.

Online interactions and activities

A VPN also can hide when you log in to your social media accounts, video game plays, interactions with standalone apps, streaming activities, and files you download.

Medical diagnosis and health conditions

If you’re worried about a medical diagnosis, you might search the web for more information. If you don’t want anyone knowing your healthcare information or maladies, or sharing information about you, a VPN can help keep your identity and your searches and downloads private.

Travel accommodations

Trying to find the best online deal on an airline ticket? Third parties like airlines associate the information you’re researching with your IP address, which essentially identifies you and your location much as a return address does. When you go back to that airline multiple times to find better deals, you likely already will be locked into a price by cookies. They already know who you are and what you’re after, so you likely won’t get that deal you’ve been searching for.

Geolocation

One side benefit of using a VPN is known as geo-spoofing, which means fooling websites and other online services into thinking you’re in one location such as the United States, when you’re really in China. This could provide a way around a country’s censorship, access geo-restricted services, or save money while doing online shopping. But remember to always check your service agreement rules and observe government laws and regulations.

Personally identifiable material

A VPN can hide your online identity by masking your IP address, therefore hiding your location and encrypting your data, which can help protect your PII. Without this protection, third parties or cybercriminals could gain access to data carriers like audio files, messages and passwords, which could then reveal personal information like your name, address, credit card information, or bank accounts.

How Norton Secure VPN can help ensure your search history is secure

A reputable VPN can help protect your online privacy. Consider a service like Norton™ Secure VPN, which provides powerful protection by helping secure private data that includes your passwords, bank details, and credit card information while you’re on your PC, Mac or any mobile device.



Symantec Mobile Threat Defense | Mobile to Stay One Step Ahead of PC Attacks

Symantec Mobile Threat Defense: Using Mobile to Stay One Step Ahead of PC Attacks


SEP Mobile detects harmful PC files on Android devices, stopping attackers from reaching their traditional endpoint targets

If daily headlines about cyber breaches teach us anything, it’s that hackers will try any way to infiltrate an organization and get their hands on sensitive data.
In recent years, mobile has served as a particularly attractive attack vector. With more and more people relying on their mobile devices for work, and with security teams having less visibility or control over BYO devices, mobile has offered attackers a less-scrutinized way to penetrate corporate assets (networks, devices, apps, etc.). While mobile devices themselves are vulnerable to threats such as malicious apps, SMS phishing, risky Wi-Fi networks, and others, mobile can also take part in attacks that target traditional endpoints in your organization.

Harmful PC Files on Mobile

Employees access corporate data on their mobile devices, anywhere and at any time. Consider that one of the first things someone does in the morning is check their email/messages on their phone. Then they may access apps, chat with colleagues or friends, or continue reading emails on their morning commute. As employees move from one place to another, their mobile devices automatically connect to various networks which they then use to access corporate resources. Think about how much data may be accessed even before an employee opens their laptop or desktop at work. This access continues throughout the day, making mobile an attractive target for cyber-attacks.
Here’s where it gets more complicated. While employees are increasingly conducting business transactions on mobile devices, through corporate apps such as Salesforce or Outlook, sometimes mobile devices may be accessing data from apps that are not monitored by IT, such as encrypted instant messaging apps, wireless sharing, and personal email. Malicious actors can use these unmanaged apps to send harmful files to victims. In most cases, if an organization’s mobile devices are protected by a mobile threat defense (MTD) solution, then malicious files on mobile will be detected. But if these files are harmful only when executed on a PC, chances are they’ll evade standard MTD detection.
Consequently, an employee might open one of these files on their traditional endpoint (laptop or desktop) giving attackers access to corporate resources without security teams having any visibility over it. For example, an employee may get via their WhatsApp (or another unmonitored messaging app) what appears to be an innocent file – but is actually a malicious PDF – from the infected device of a colleague or friend. The sender may be unaware that their device is infected, and the receiver, trusting the sender, will try to open the file. As the PDF might not appear or open properly on the receiver's mobile device, the victim may try to open it on their laptop. Alternatively, if the file seems fine, the employee may pass it on to another colleague via Slack, and from there the colleague may open it on their PC.
If proper security controls are not in place in the organization, opening the file on a traditional endpoint can have hazardous consequences. Attackers can leverage this attack vector to cause greater damage throughout the organization, moving laterally through the network and searching for key data to steal.
Since various types of PC malware such as spyware, viruses, worms, trojans, and others generally do not impact mobile devices as they do PCs, these threats avoid raising any red flags in terms of mobile security. The real risk occurs when these files reach traditional endpoints. As mobile usage increases, the chance of files sent from mobile devices being opened or shared on traditional endpoints increases as well.

An Extra Layer of Visibility

Symantec, one of the only vendors that provides a solution for both modern and traditional endpoints (laptops and desktops, as well as iOS and Android devices) and is a market leader in both, protects against exploitation from all malicious files no matter what endpoint or platform your employees are using. We utilize our endpoint detection engines and technology everywhere your employees access corporate data – mobile, desktop, email, and network, and give both security teams and end users an additional layer of visibility over their threat landscape.
Our mobile threat defense (MTD) solution, Symantec Endpoint Protection Mobile (SEP Mobile), uses deep intelligence on file reputation to detect harmful PC files on Android devices. Reputation insight comes from Symantec’s Global Intelligence Network (GIN), the largest civilian threat intelligence database in the world, covering telemetry from more than 175 million endpoints.

Forensics for Threat Hunting

In every harmful PC file incident detected by SEP Mobile, we provide granular forensics on the malware family and its path on the device. The SEP Mobile management console includes a brand new “Files” threat family, which contains the harmful PC file detection and other file-based threats.
In the example below, SEP Mobile detected PC malware on an Android device in one of our customer environments. We can see in the forensics that the malicious file is a Trojan, it was sent to the end user via the popular messaging app Telegram, and the user first saw or opened this file on their mobile device. The forensics also reference further information from Symantec’s security research center on the virus and its consequences when executed on a PC.



A Day In The Life – Symantec’s STAR Team: Dublin

How Norton Team Work day in out 365 24x7






It takes a non-stop operation to stay one step ahead of even the most sophisticated and elusive threats out there today. Working from nine response centers located across the globe, the seasoned security experts on our STAR (Security Technology and Response) team deliver around-the-clock protection to Norton customers, 365 days a year. In this video we meet some of the experts in Dublin. These STAR Team professionals spend their days battling on the frontline of digital crime.


Learn more

norton.com/setup



Regards

Shaawn H Parker

How To Request A Refund From Norton Products and Services


Norton Product Refunds | Renewals Cancellation




Norton products (including subscriptions and Automatic Renewals) may be refunded within 60 days of the purchase date. Shipping, handling, and any applicable tax are not refundable except in certain states and countries where these items are refundable. For exceptions, read the full Norton return and cancellation policies.
Visit the Norton Support home page before you request a refund for assistance with common questions or issues.
Setup and Install Norton AntiVirus; Activate Norton antivirus software; Locate and remove viruses and spyware via norton.com/setup

Request a Norton Automatic Renewal refund


If you want a refund for your Norton Automatic Renewal charge, contact a Norton Support representative through Norton Support.






Request refund for Norton Core router purchased on Norton Online Store

  • To receive a refund for your Norton Core router purchased on the Norton Online Store, contact Norton Core Support to initiate the return process.
    • A prepaid shipping label will be sent to your registered email address specified.
    • Print the prepaid shipping label and return your router and all cables in their original box with the label securely fixed on the box at the nearest UPS outlet.

Request refund for Norton Core router purchased retail store, Amazon and BestBuy

    To receive a refund, return the router to the reseller/retailer (Amazon or BestBuy) you purchased from.
    If you cannot return to where you purchased, please follow these steps:
  1. Get the serial number for your Norton Core router. The serial number is found under the router or on the bottom of the product box.
  2. Print, complete and sign the Norton Core Return Form
  3. Photocopy or print an image of the Norton Core serial number located under the router or under the box.
  4. Photocopy or print an image of the original receipt showing the purchase date and price paid for Norton Core.
  5. Send the printed, completed and signed form, copy of Norton Core serial number and copy of receipt to the address provided in the form. The information for how to send is on the form.
    Do not staple or tape your submission items together.
    • Upon receipt and approval a prepaid shipping label will be sent to the email address specified on the Norton Core Return form.
    • Pack the Norton Core router and all cables in their original box.
    • Print and affix the prepaid shipping label securely to the original Norton Core box and mail at the nearest UPS outlet.
    • Once we receive the box with the router and cables, a check will be sent to the address provided on the Norton Core Return form. Please allow six weeks for processing.

Request refund for Norton subscription purchased from Norton Online Store

  • To obtain a refund for Norton subscription that you purchased from the Norton Online Store, contact Norton Chat Support.

Request refund for Norton subscription purchased from a third-party online or retail store

    Failure to include all required items can cause your refund request to be rejected.
  1. Print, complete and sign the required form for your region. Select your region:
    Please allow six weeks for the refund to be processed.
  2. Photocopy or print an image of the Subscription Key label used to activate your Norton.
      • This is necessary to validate your purchase and prevent use of the subscription after the refund.
      • For most subscriptions, this is a 25 character key that can be found on a card or CD envelope in the package you purchased. See example:
  3. Photocopy or print an image of the original receipt showing the purchase date and price paid for Norton.
  4. Send the printed, completed and signed form, copy of Subscription Key label and copy of receipt to the address mentioned in the form. The information for how to send is on the form.
Do not staple or tape your submission items together.
Important license notice
In accordance with the license agreement, after you receive your refund the Norton license will be disabled to prevent further use. You must delete all program files for the subscription that you return.