Why Should I Upgrade Norton Anti Virus ?
The business world has a direct connection with Symantec. The brand emphasizes larger corporations and enterprises while their Norton wing focuses on the average consumer. Their anti-virus products are built using the same code and developed by the same team. This means all related threats are countered, and nothing goes amiss. Symantec works hard on patching problems for both set of products rather than focusing on one. Those who are using a product from this company need to upgrade their product immediately. Check out the top Norton Coupons We have listed here at HighTech for great savings as well.
What were the vulnerabilities? There was a range of them including minimal user interaction and a default configuration with complete access for the software. This meant the code would load into the kernel and cause memory corruption. This can tamper with the machine and ruin it for those who are unaware.
Additional vulnerabilities include attackers being able to access any computer connected to the device they’ve hacked. For example, a Malware file gets onto the system and has an “executable” file which is compressed. The software doesn’t pick up on this file and lets it go through. This means the operating system’s kernel allows the malware file hide and that’s when complete access is offered. It allows the hacker to run the device from their location.
Symantec has been working on these kinks to make sure they’re addressed. They have updated their core products through the “LiveUpdate” feature. The same applies to the company’s Norton products. The premise of LiveUpdate is to ensure the software is working on all cylinders as necessary. You should be going through this avenue with your product rather than doing it manually.
Yes, the “Enterprise” line might require manual updates with the help of an advisor from Symantec. Take your time to work on this as an enterprise if necessary to ensure the kinks are removed as soon as possible. Do not keep using the Symantec product as it is because the vulnerabilities will create issues.
Get the update and make the change as soon as you can to ensure the software is working as it’s designed to.
Related articles across the web
North Korean Group Would Be Most Likely For Recent Ransomware Attacks
On Monday the cyber security company Symantec stated that is was highly likely that a North Korean affiliated hacking group was responsible for the WannaCry cyber attack that occurred this past month and infected over 300,000 computers all over the world and disrupted schools, banks and hospitals worldwide.
Symantec researchers report that they found multiple occurrences of code that were used in both earlier WannaCry versions and previous activity that has been linked to the North Korean group and now highly recommend users install Norton antivirus and update any existing version of its software ( coupons are found here ).
The name Lazarus has been given by security companies to the group that was behind the Sony hacking attack as well as others. Earlier Symantec had said that they don’t attribute cyber campaigns to governments directly, however its researchers din’t dispute the widely held belief that the group Lazarus works for the North Korean government.
In the meantime Vikram Thakur, who is the security response technical director for Symantec, stated in an interview that the flaws within the WannaCry code, its broad reach and demand for payment in electronic bitcoin in order to decrypt the damaged files, all suggest that the hackers weren’t working for the government of North Korea.
What Is WannaCry?
For the uninitiated, WannaCry is ransomware that has infected hundreds of thousands of computers all over the world. Most reports suggest that Britain’s public system has been hit very badly, and reportedly entire wards have closed and staff from the National Health Service has been sent home. An automated system was used by the WannaCry version that has spread like wildfire and wreaked havoc was based on EternalBlue, which is a hacking tool that the Shadow Brokers hacking group was able to steal from the U.S. National Security Agency.
The theory that the reason for WannaCry to be deployed was to cause chaos worldwide and prove that Lazarus – and North Korea by extension – was capable of deploying a serious crippling attack has been dismissed by Symantec researchers. The very same command-and-control server was used by the WannaCry attacks that were used in the hacking of Sony Pictures Entertainment by North Korea in 2014, which wiped out almost half of the corporation’s servers and personal computers. In addition, the researchers state that the same tools were used in earlier Lazarus attacks on media companies and banks in 2013 in South Korea, were used in this WannaCry ransomeware episode as well. The tools have evolved, however they are what researchers refer to as “variants” of those same tools that were utilized in other attacks.
In the month of May, another hacker group called the Shadow Brokers published the details of the hacking tools from the U.S. National Security Agency that were used by the WannaCry hackers to add strength to their attacks. A leaked N.S.A. hacking tool was used to spread from one server to the next automatically, and ultimately infected hundreds of thousands of computers all over the world, particularly Asia and Europe. There are some computer security experts that have stated that it’s too soon to be accusing North Korea. In addition, North Korea officials are denying being involved.
Here are the best coupon deals for Norton for all the different country versions