Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Website Security Solutions
Showing posts in English
Jimmy Edge | 22 Oct 2012 | 0 comments

The latest Get Safe Online campaign – Click and Tell - has been launched in the UK this week, and the organisers will be hopeful that the campaign can educate people in the importance of online security.

The Get Safe Online initiative was launched in October 2005 and has gathered significant momentum each year since.

The week is designed to inform people about the basics of using the internet and still keeping yourself safe from fraud, with established website security companies such as Symantec getting firmly behind the campaign.

What does the week mean for me?

Have you ever been charged for a number of premium-rate text messages which you did not actually send? Or have you ever found yourself to be the target of online...

Jeannie Warner | 11 Oct 2012 | 0 comments

When your mobile or web browser address bar turns green it’s a clear sign that you can complete a transaction, or fill out an online form with confidence. The green address bar indicate that you’re on a site that has an Extended Validation (EV) certificate, a measure increasingly used by organizations to provide reassurance to customers who are wary of sharing personal information online. Sites protected by an EV certificate must pass the industry’s most stringent standards for identity validation and if the certificate is from Symantec it also protects you from malware, as these sites are scanned daily for infection.

To receive  an EV certificate, an organization  not only has to demonstrate secure encryption methods but also pass rigorous checks based on the highest industry standards to prove that it is a legitimate company, including: 

  • It...
AllenKelly | 05 Oct 2012 | 0 comments

To participate in the contest:

  1. Follow @NortonSecured on Twitter.
  2. Visit your favorite websites.
  3. Spot the Norton Secured Seal.
  4. Tweet the following: “I saw the @NortonSecured Seal at [website URL] #SpotTheCheck”                            

That's it! Each week for the next 10 weeks, entrants will be entered into a random drawing for a chance to win a $100 Amazon gift card!

Tweets must include @NortonSecured, the publicly-accessible website URL, and #SpotTheCheck.

FranRosch | 27 Sep 2012 | 1 comment

Recently, the industry has seen increased instances involving malware signed by legitimate code signing certificates owned by legitimate companies. In each of these incidences, the private key, associated with the code signing certificate, was either compromised or otherwise maliciously used.  Code signing private keys are owned and protected by the company or business, and not the Certificate Authority (CA).

Symantec advises companies to apply rigorous protection and security policies to safeguard private keys for code signing. As it is our responsibility as a CA to thoroughly authenticate each organization that applies for a code signing certificate, it is also the responsibility of the certificate owners to protect their private keys from compromises. When malicious code makes its way into the wild, it hurts everyone whether it’s a business, organization or user.

Symantec recommends the following best security practices and policies to protect code...

FranRosch | 25 Sep 2012 | 0 comments

With National Cyber Security Month right around the corner, I  wanted to take this chance to discuss Symantec’s point of view about the current state of the Certificate Authority (CA) industry.

After a year riddled with highly publicized CA security breaches that threatened to undermine confidence in the entire system the message is clear:  In order to build public confidence and protect the trust model that the Internet relies on every single day (over 4.5 million sites!), the CA industry must pull together and focus on improving its operations and practices while adapting to a constantly evolving technological environment. 

One way we do this is by actively supporting organizations such as the CAB Forum and the Online Trust Alliance (OTA).  Coming up shortly is the Online Trust Forum in San Jose, CA on Oct 2-4.  To...

Jeannie Warner | 10 Sep 2012 | 4 comments

This is the first in a series of ponderings I've been having about Cloud computing, how little it's understood by end consumers, and what we in the IT space need to do to better educate the people on the street. The general internet has been greedy in terms of self-interest, selling people short in its expectations of their ability to learn about concepts and ideas. However, I am idealistic enough to really believe that once people understand what is in their best interest in terms of internet security, they will tend to act in ways that support that self-interest, to the extent that they are able. And so if we wish people to act in enlightened self-interest, we need to educate the society around us.

This pondering started when I read this viral article from the Business Insider, spread by Facebook:

FranRosch | 04 Sep 2012 | 1 comment

Trust on the internet isn't just a catch phrase. It's a concern that engenders policies that extend from the virtual world of security products and integration all the way down into process and physical reinforcement. It is also a daily practice at Symantec, where we back up our mission statements with concrete, measured practices. We built our datacenter facilities with a defense in depth approach, and believe in practicing what we preach regarding the standards a CA should adhere to. My leadership team demands that our infrastructure supports our strategy to be the best.

We gave the folks at CNet a tour of our Operations facility where we process SSL Certificates, and showed them our model of what makes a secure facility. We are constantly investing in improvement, keeping up with the latest trends in physical security as a vital link to supporting our virtual security. Recently, CNet published the following article about what they saw on that tour:


Jeannie Warner | 28 Aug 2012 | 0 comments

Keeping Your Personal Information Secure

It’s a great time for sports fans, with the summer Olympics still fresh in our minds, the NFL season kicking off, and hockey and basketball just around the corner. Unfortunately, it’s also a great time for cyber criminals who take advantage of the excitement to steal valuable personal information.

A common approach, known as “phishing,” uses phony emails that inform fans they have won the “NFL Lottery” or can purchase discounted tickets. These emails often contain links to websites that look genuine but are designed to trick users into providing login and password details. Some also include attachments that can download nasty computer viruses.

As scammers grow more sophisticated, users have to up their defensive game. Here are some tips to help protect against phishing attacks:

  1. Never click on links or open attachments in unsolicited emails....
FranRosch | 15 Aug 2012 | 0 comments

Last week Netcraft released its monthly report on global SSL certificate issuance and market share. The report states that Symantec experienced another banner month of growth.  According to the August 2012 Netcraft report, Symantec saw the largest overall gain in net new SSL certificates. We continue to remain the overall SSL market leader with a market share of 38.4% (Netcraft, August 2012).  Our internal Symantec model actually reflects that Symantec has a much larger market share as many large Enterprises use our SSL certificates behind their firewalls where Netcraft is unable to explore. 

Symantec also continues to dominate the Extended Validation (EV) SSL market segment, outpacing the competition in terms of growth while issuing 64.5% of all active EV SSL certificates today. EV SSL certificates offer the highest level of validation, and provide consumers the absolute highest level of trust in the websites they are sharing data with. It’s important...

DeanJC | 13 Aug 2012 | 0 comments

Code signing has been around forever and was the initial step to keeping personal computer systems secure. The concept is simple: have developers digitally sign their code before it’s released so that if it turns out to be malware, we can determine who signed it and when. Then we call the FBI, arrest the malware author and clean up our machines.  On the surface this sounds pretty straightforward, but

Over the last few years, it was discovered that stolen code signing certificates have been used to sign malware. No one knows for sure how the certificates were stolen but most likely, the private keys, which are stored on PCs, were not protected with good passwords and were hacked. Those keys were then used to sign code such as Stuxnet.  Stolen keys undermine code signing and something had to be done about that.

Most people have heard of Extended Validation (EV) SSL certificates; an SSL certificate which displays differently in the browser, utilizing a...