Website Security Solutions

Website Security Solutions allow companies and consumers to engage in communications and commerce online with trust and confidence. With more than one and a half million web servers using our SSL certificates, an infrastructure that processes more than four and a half billion certificate checks daily, and a trust mark that is seen more than half a billion times a day in 170 countries, the Norton Secured seal is the most recognized symbol of trust on the Internet.

Follow Us on Twitter
  • 0
    Created: Jimmy Edge 11 Jan 2013

    Navigating the global threat landscape for online businesses

    Running an ecommerce site is a rewarding business. There are almost 2.5 billion people online, and the global consumer ecommerce market is worth around $1 trillion, which is nothing to be sneezed at. But that opportunity also attracts criminals, which is why running any public-facing website is highly risky. The cost of cybercrime runs into the hundreds of billions each year, and in 2011, 403 million unique variants of malware were discovered, according to Symantec's Internet Security Threat Report. That's not just stolen money we're talking about – you also need to factor in compensation payments, the time and manpower it takes to clean up after a successful attack, and the massive...
  • 0
    Created: FranRosch 08 Jan 2013

    Why your choice of a Certificate Authority matters in the long run

    By now you’re probably aware of the Turkish Certificate Authority that had mistakenly issued two intermediate CA certificates to two organizations in Turkey. With these trusted intermediate certificates, the two organizations, a Turkish bank and a Turkish government transportation agency, had the ability to issue fraudulent or unauthorized certificates for domains that they do not control. In this instance, a rogue, wildcard certificate was issued for google.com without permission from Google.  According to the certificate authority, TURKTRUST, this incident occurred during a software migration in August 2011. In a statement released by the CA, the certificate profiles of the intermediate certificates in question were moved to a production server. This led to intermediate CA certificates being issued without the CA realizing what had happened. Google identified the rogue certificate on their domain on December 24th. Since then the bad intermediate certificates...
  • 0
    Created: Brian Wall 19 Dec 2012

    No time to be in denial!

    DDoS (Distributed Denial-of-Service) attacks on SSL secured services are on the rise and becoming increasingly aggressive – no wonder, therefore, that these are getting more and more attention, as anxieties rise. The upshot, when it comes to social media in particular, is that high profile services have rushed to embrace SSL (Secured Socket Layer) at its highest level, so as to improve security and address privacy concerns, while protecting transactions and services. After all, none of them wants to be the site that reveals your most personal details to hackers. If you’re not fully yet familiar with DDOS and its implications, it’s worth knowing the kinds of havoc they can cause and why those extreme levels of protection need to be in place. So here’s a quick overview that may help you to avoid suffering a denial of service in your own workplace. In a...
  • 0
    Created: FranRosch 13 Dec 2012

    Microsoft goes Always On with EV for Outlook.com

    On Tuesday, Microsoft announced that they have just upgraded their entire Outlook.com mail environment to an Always On SSL experience, protected by Extended Validation (EV).  This means that all of the user’s data is protected via 2048-bit encryption - not just the log on page - on Outlook.com, as well as Hotmail, and Live. This is a big deal. Always-On SSL is the most recommended way for any kind of social media to be enabled for user security.  When a site is completely hosted over HTTPS, the user is much better protected from attacks and surveillance.  For example, on sites without Always On SSL, although the logon would be encrypted, if the subsequent pages are not protected by HTTPS the cookie with the login credentials could be intercepted and used for malicious purposes. ...
  • 0
    Created: Brian Wall 05 Dec 2012

    Criminal Mind Games

    Attacks using malware – eg, malicious software embracing everything from computer viruses, worms, Trojan horses, spyware adware and other malicious programs –have reached epidemic proportions. Ask around your office now, or your social networking friends, and someone will have experienced such an event or know someone who has. Have you been hit, for example, by the Dorkbot worm?  It caused havoc for untold numbers of Facebook and Twitter users, and has since been socially engineering Skype users into downloading the malware, whose payload includes a mechanism to lock down machines. It delves through an infected Skype user's contact list and sends out the message: ‘Lol is this your new profile pic?’ in English and a similar greeting in German. Clicking on the link opens a .zip file that contains ‘skype_02102012_image.exe’. So far, so bad. Unzipping the file then opens a...
  • 2
    Created: Jimmy Edge 29 Nov 2012

    Staying Safe While Making Online Payments

    Making online payments for everything from gig tickets to major sporting events is one of the most convenient benefits of the internet revolution. However, often the price is not as convenient if going through recognised channels, and it can be mightily tempting to seek out lower prices from sources that you have not used before. This could be a very risky move though. An alarming 1 in 10 people within the UK have apparently fallen victim to scams whilst paying for tickets/products online. Below, we have looked at a few ways in which you can stay as secure as possible when making online payments: Double check all details of your purchase before confirming the payment instruction. It sounds simple, but it is possible that you could have missed something...
  • 0
    Created: Jimmy Edge 28 Nov 2012

    On The Rack from Hack Attacks

    As social networking begins to shrink the world and attract users by the billion, you won’t be surprised to hear that the hacker sharks are out there amongst them, and that they are starting to indulge in a feeding frenzy. Recent investigations have detected a huge black market for social network fraud. Moreover, about one third of discussions in one particular hacker forum focused on training and tutorials for data theft techniques, such as SQL injection (a technique often used to attack a website) – and yet industry analysts estimate that less than 5% of IT budgets include products to mitigate attacks in the data centre.  How does your organisation stack up against that percentage? And how much of a threat do these cyber criminals pose to you personally and, in the wider context, the business you work for? The answer has to be: a massive threat – especially when the hacker forum in question that was infiltrated contained around a quarter of a...
  • 0
    Created: Brad 26 Nov 2012

    Keep Your Website, and Your Customers Safe This Holiday Season

    With Thanksgiving approaching, the holiday season is once again upon us. While most of us consider the holiday season to give thanks and spend precious time with family and friends, we will also spend a considerable amount of money online. Nearly 120 million Americans will shop online the Monday following Thanksgiving. The growth in online spending isn’t isolated to the US, it is increasing globally. With this rise in online shopping comes an increase in cyber crime. As more people go online worldwide, individuals are increasingly becoming targets for fraudsters and cyber-criminals. According to the 2012 Norton Cybercrime Report, cybercrime claims 556 million victims each year. Both businesses and consumers are victims of malware, phishing and malvertising threats.  We all know how important it is to ensure that your network is secure, not only for the sake of business continuity...
  • 1
    Created: Rick Andrews 26 Nov 2012

    2013 Predictions for SSL

    It doesn’t take a crystal ball to predict that 2013 will press the limits of the mobile infrastructure.  The sales of smart phones and tablets are through the roof, and apps are being written at a fast pace. This is a boon for many, bringing the internet and cloud applications to the hands of users all over the world, who may not own a computer or have ISP service, but do own a phone. In the race to be part of the mobile rush however, fast app development is often more valued than a well thought out and secure application.  As a result, SSL/TLS app failures can result in broken, disabled or nonexistent validation behind the scenes of mobile applications.  SSL is the backbone technology for secure connections between the app and the cloud, but without proper certificate handling by the developers it’s still vulnerable to attacks by outsiders. This core vulnerability presents a real danger, and it’s imperative that the app developer learn how...
  • 0
    Created: Jeannie Warner 15 Nov 2012

    How Websites Deal with Rejection

    An SSL/TLS Certificate, which website visitors see by the HTTPS:// prefix in the address bar of your browser lets you know that the site you are visiting has been authenticated, and any information you share with that site is encrypted. Knowing that a site is legitimate and secure is especially important with holiday shopping season upon us, where scam sites spring up like snowmen only to melt away with your money. Symantec takes its responsibility as a certificate authority seriously. It is very important that we do not issue SSL certificates to questionable organizations. Any website with a Symantec SSL certificate has gone through strict authentication practices and procedures. There are also some very firm processes for revoking certificates, or not renewing certificates if there is an issue with an organization. In fact, on average 6-8% of requests for new certificates and renewals are declined. That means Symantec denies tens of thousands of requests every year, as...