INTERNET SECURITY THREAT REPORT APPENDIX 2014 P

Total Page:16

File Type:pdf, Size:1020Kb

INTERNET SECURITY THREAT REPORT APPENDIX 2014 P 2013 Trends, Volume 19, Published April 2014 INTERNET SECURITY THREAT REPORT APPENDIX 2014 p. 2 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 CONTENTS 5 APPENDIX :: A 20 Malicious Web Activity: Malicious Code By Number of Infections per Site THREAT ACTIVITY TRENDS for Top-Five Most Frequently Exploited Categories 6 Threat Activity Trends 20 Malicious Web Activity: Malicious Code by Number of Infections per Site 7 Malicious Activity by Source 21 Malicious Web Activity: Fake Antivirus by Category 8 Malicious Activity by Source: 22 Malicious Web Activity: Browser Exploits by Category Overall Rankings, 2012–2013 23 Malicious Web Activity: Social Networking Attacks by Category 8 Malicious Activity by Source: Malicious Code, 2012–2013 24 Bot-Infected Computers 9 Malicious Activity by Source: 24 Top-Ten Bot Locations by Average Lifespan Phishing Hosts, 2012–2013 of Bot, 2012–2013 9 Malicious Activity by Source: Spam Zombies, 2012–2013 26 Denial of Service Attacks 10 Malicious Activity by Source: Web Attack Origins, 2012–2013 30 Analysis of Mobile Threats 30 Android Mobile Threats: 10 Malicious Activity by Source: Newly Discovered Malicious Code, 2012–2013 Bots, 2012–2013 31 Mobile Threats: Malicious Code by Platform, 2013 11 Malicious Activity by Source: Network Attack Origins, 2012–2013 31 Android Mobile Threats: Average Number of Malware Variants 12 Malicious Web-Based Attack Prevalence per Family, 2012–2013 12 Malicious Website Activity, 2012–2013 32 Mobile Threats: Malicious Code Actions in Malware, 2012–2013 14 Analysis of Malicious Web Activity 32 Mobile Threats: by Attack Toolkits Malicious Code Actions – Additional Detail, 2012–2013 14 Malicious Website Activity: 33 Mobile Threats: Attack Toolkit Trends Documented Mobile Vulnerabilities by Platform 15 Malicious Website Activity: 33 Mobile Threats: Overall Frequency of Major Attack Toolkits Documented Mobile Vulnerabilities by Month 16 Analysis of Web-Based Spyware, Adware, 36 Quantified Self – A Path to Self-Enlightenment and Potentially Unwanted Programs or Just Another Security Nightmare? 16 Potentially Unwanted Programs: Spyware and Adware Blocked 37 Data Breaches that could lead to Identity Theft 38 Timeline of Data Breaches 17 Analysis of Web Policy Risks Showing Identities Breached in 2013, Global from Inappropriate Use 39 Data Breach Incidents by Sector 17 Web Policies that Triggered Blocks, 2012–2013 40 Identities Exposed by Sector 19 Analysis of Website Categories Exploited 41 Average Number of Identities Exposed to Deliver Malicious Code per Data Breach by Notable Sector 19 Malicious Web Activity: 42 Top Causes for Data Breach by Number of Breaches Categories that Delivered Malicious Code 42 Top Causes for Data Breaches by Number of Identities Exposed p. 3 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 43 Types of Information Exposed by Data Breach 77 APPENDIX :: C 43 Average Number of Identities Exposed SPAM + FRAUD per Data Breach, by Cause ACTIVITY TRENDS 44 Threat of the Insider 78 Spam and Fraud Activity Trends 45 Gaming Attacks 79 Analysis of Spam Activity Trends 46 The New Black Market 79 Global Spam Volume in Circulation 80 Proportion of Email Traffic Identified as Spam, 2012–2013 48 Footnotes 81 Analysis of Spam Activity by Geography, Industry Sector, and Company Size 49 APPENDIX :: B 81 Proportion of Email Traffic Identified as Spam MALICIOUS CODE TRENDS by Industry Sector 82 Proportion of Email Traffic Identified as Spam 50 Malicious Code Trends by Organization Size 51 Top Malicious Code Families 82 Proportion of Email Traffic Identified as Spam by Geographic Location 52 Overall Top Malicious Code Families 53 Relative Proportion of Top-Ten Malicious Code Blocked 83 Analysis of Spam Delivered by Botnets in Email Traffic by Symantec.cloud in 2013, 83 Top Sources of Botnet Spam by Location by Percentage and Ratio 84 Analysis of Spam-Sending Botnet Activity 53 Malicious Code Blocked in Email Traffic at the End of 2013 by Symantec.cloud, 2012–2013 54 Relative Proportion of Top-Ten Malicious Code Blocked 85 Significant Spam Tactics in Web Traffic by Symantec.cloud in 2013, 85 Frequency of Spam Messages by Size by Percentage and Ratio 85 Proportion of Spam Messages Containing URLs 56 Analysis of Malicious Code Activity 86 Analysis of Top-Level Domains Used in Spam URLs by Geography, Industry Sector, and Company Size 57 Proportion of Email Traffic Identified as Malicious 87 Analysis of Spam by Categorization by Industry Sector 88 Spam by Category 57 Proportion of Email Traffic Identified as Malicious by Organization Size 89 Phishing Activity Trends 89 Phishing Rate, 2012–2013 58 Propagation Mechanisms 90 Phishing Category Types, Top 200 Organizations 58 Propagation Mechanisms 90 Tactics of Phishing Distribution 60 Email-Targeted Spear-Phishing Attacks Intelligence 92 Analysis of Phishing Activity by Geography, 68 Miniduke Sample of Email Subjects, Documents, and MD5s Industry Sector, and Company Size 71 Elderwood Sample of Email Subjects, 92 Proportion of Email Traffic Identified as Phishing Documents, and MD5s by Industry Sector 74 APT1 Sample of Email Subjects, Documents, and MD5s 92 Proportion of Email Traffic Identified as Phishing by Organization Size 76 Footnotes 93 Proportion of Email Traffic Identified as Phishing by Geographic Location 94 New Spam Trend: BGP Hijacking 99 Footnotes p. 4 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 100 APPENDIX :: D VULNERABILITY TRENDS 101 Vulnerability Trends 102 Total Number of Vulnerabilities 102 Total Vulnerabilities Identified 2006–2013 103 New Vulnerabilities Month-by-Month, 2012–2013 103 Most Frequently Attacked Vulnerabilities 105 Zero-Day Vulnerabilities 105 Volume of Zero-Day Vulnerabilities, 2006–2013 106 Zero-Day Vulnerabilities Identified 108 Web Browser Vulnerabilities 108 Browser Vulnerabilities, 2011–2013 109 Web Browser Plug-in Vulnerabilities 109 Browser Plug-In Vulnerabilities, 2012–2013 111 Web Attack Toolkits 112 SCADA Vulnerabilities 112 SCADA Vulnerabilities Identified 114 Footnotes 115 About Symantec 115 More Information p. 5 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 APPENDIX A :: THREAT ACTIVITY TRENDS THREAT ACTIVITY TRENDS THREAT APPENDIX :: A p. 6 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 APPENDIX A :: THREAT ACTIVITY TRENDS Threat Activity Trends The following section of the Symantec Global Internet Security Threat Report provides an analysis of threat activity, data breaches, and web-based attacks, as well as other malicious actions that Symantec observed in 2013. The malicious actions discussed in this section also include phishing, malicious code, spam zombies, bot-infected computers, and attack origins. Attacks are defined as any malicious activity carried out over a network that has been detected by an intrusion detection system (IDS) or firewall. Definitions for the other types of malicious activities can be found in their respective sections within this report. This section will discuss the following metrics, providing analysis and discussion of the trends indicated by the data: • Malicious Activity by Source • Malicious Web-Based Attack Prevalence • Analysis of Malicious Web Activity by Attack Toolkits • Analysis of Web-Based Spyware, Adware, and Potentially Unwanted Programs • Analysis of Web Policy Risks from Inappropriate Use • Analysis of Website Categories Exploited to Deliver Malicious Code • Bot-Infected Computers • Denial of Service Attacks • Analysis of Mobile Threats • Quantified Self – A Path to Self-Enlightenment or Just Another Security Nightmare? • Data Breaches That Could Lead to Identity Theft • Threat of the Insider • Gaming Attacks • The New Black Market p. 7 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 APPENDIX A :: THREAT ACTIVITY TRENDS Malicious Activity by Source Background Methodology Malicious activity usually affects computers that are connected These metrics assess the sources from which the largest to high-speed broadband Internet because these connections are amount of malicious activity originates. To determine malicious attractive targets for attackers. Broadband connections provide activity by source, Symantec has compiled geographical data on larger bandwidth capacities than other connection types, numerous malicious activities, namely: malicious code reports, including faster speeds, the potential of constantly connected spam zombies, phishing hosts, bot-infected computers, network systems, and a typically more stable connection. Symantec attack origins, and web-based attack origins. The proportion of categorizes malicious activities as follows: each activity originating in each source is then determined. The mean of the percentages of each malicious activity that origi- • Malicious code: This includes programs such as viruses, nates in each source is calculated. This average determines the worms, and Trojans that are covertly inserted into programs. proportion of overall malicious activity that originates from the The purpose of malicious code includes destroying data, source in question, and the rankings are determined by calcu- running destructive or intrusive programs, stealing sensitive lating the mean average of the proportion of these malicious information, and compromising the security or integrity of a activities that originated in each source. victim’s computer data. • Spam zombies: These are remotely controlled, compromised systems specifically designed to send out large volumes
Recommended publications
  • 2015 Internet Security Threat Report, Volume 20
    APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT APPENDICES 2 2015 Internet Security Threat Report | Appendices THREAT ACTIVITY TRENDS MALICIOUS CODE TRENDS SPAM & FRAUD ACTIVITY TRENDS VULNERABILITY TRENDS GOVERNMENT THREAT ACTIVITY TRENDS BACK TO TABLE OF CONTENTS 4 Appendix A: 79 Appendix D: Threat Activity Trends Vulnerability Trends 5 Threat Activity Trends 80 Vulnerability Trends 6 Malicious Activity by Source 81 Total Number of Vulnerabilities 12 Malicious Web-Based Attack Prevalence 83 Zero-Day Vulnerabilities 14 Analysis of Malicious Web Activity by Attack Toolkits 86 Web Browser Vulnerabilities 16 Analysis of Web-Based Spyware, Adware 88 Web Browser Plug-In Vulnerabilities and Potentially Unwanted Programs 90 ICS Vulnerabilities 18 Analysis of Web Policy Risks from Inappropriate Use 92 Footnotes 20 Analysis of Website Categories Exploited 93 About Symantec to Deliver Malicious Code 93 More Information 22 Bot-Infected Computers 24 Analysis of Mobile Threats 30 Data Breaches and Identity Theft 36 Appendix B: Malicious Code Trends 37 Malicious Code Trends 38 Top Malicious Code Families 42 Analysis of Malicious Code Activity by Geography, Industry Sector, and Company Size 45 Propagation Mechanisms 48 Targeted Attacks Intelligence: Going from Isolated Attacks to Coordinated Campaigns Orchestrated by Threat Actors 61 Appendix C: Spam & Fraud Activity Trends 62 Spam and Fraud Activity Trends 63 Analysis of Spam Activity Trends 64 Analysis of Spam Activity by Geography, Industry Sector, and Company Size 67 Analysis of Spam Delivered
    [Show full text]
  • Norton Antivirus Product Manual
    NortonTM AntiVirus Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton AntiVirus™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 21.4 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Antivirus Bot Protection Norton Safe Web Firewall NEW!
    Antivirus Antispyware Bot Protection Identity Protection Norton Safe Web Norton™ Pulse Updates Firewall Network Monitoring NEW! SONAR™ 2 Behavioral Protection Parental Controls NEW! Norton System Insight Vulnerability Protection NEW! Norton Insight Network NEW! Professional-Strength AntiSpam NEW! Norton Download Insight NEW! Norton File Insight NEW! Norton Threat Insight IMPROVED! Helps stop online identity theft, viruses, spyware, bots and more — Guards your PC, online activities, and your identity against all types of Internet threats. IMPROVED! Helps stop attacks before they get on your PC — Proactively blocks hackers and prevents dangerous software from downloading to your computer when you surf the web. NEW! Delivers clear performance and threat explanations — Gives you greater insight into downloaded applications and files by telling you where they came from, if they can be trusted, and how they may impact your PC's resources and performance. NEW! Identifies unsafe web sites right in your search results — Warns you of dangerous web sites and suspicious sellers so you can surf and shop online with confidence. Uses intelligence-driven Norton Insight Network for faster, fewer, shorter scans — Detects and eliminates dangerous software with the shortest scan times of any security product.* • Automatically finds and fixes common problems • Accelerates startups • Defragments disk for faster performance • Frees up disk space – boosts performance • Removes cookies, temporary files, Internet clutter • Lets you view current Windows processes for maximum performance • Purges unwanted security-sensitive data • Automatically benchmarks performance to optimum standards • Registry Defragmenter • Disk Bleacher • Registry Cleaner • Restore Center • Startup Manager • System Optimiser • Service Manager • Process Viewer • Disk Defragmenter • Performance Test • Disk Cleaner Boost PC performance.
    [Show full text]
  • Norton-360.Pdf
    Norton™ 360 Product Manual Norton™ 360 Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • Norton 360 User Guide on the CD Or the USB Drive in PDF Format
    User Guide See back cover for Quick Installation. We protect more people from more online threats than anyone in the world. Care for our Environment, ‘It's the right thing to do’. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. Norton 360™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 4.0 Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, SONAR, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton SystemWorks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Web Based Attacks February 2009 Onfidence Confidence in a Connected World
    alware authors are leveraging this fact to deliver attacks via onfidence in a connected world. The Web has become an important part of home and work life. M the Web for financial gain rather than personal fame. This paper examines some of the more popular attack techniques and outlines some best practices for being safe online. Web Web Based Attacks February 2009 C WHITE PAPER: CUSWEBT BAOMSIEDZE ATTACKS White Paper: Web Based Attacks Web Based Attacks February 2009 Contents 1. Introduction . .4 Anatomy of a Web attack . .5 2. How do Web sites get infected? ....................................................6 Why target mainstream Web sites? . .6 The complexity of modern Web sites ................................................6 How are legitimate Web sites compromised? .........................................6 SQL Injection Attacks.............................................................7 Malicious advertisements (malvertisements) . 8 3. Getting onto a user’s computer (part 1 – automatically) . 8 The drive-by download . .8 Software vulnerabilities..........................................................10 Web attack toolkits . .10 Hiding the attacks: the cat and mouse game . 11 Obfuscation of the actual attacks .................................................11 Dynamically changing URLs and Malware . 12 Hijacking Web pages or “Clickjacking” . .12 Today’s attacks render old detection technologies ineffective...........................13 How often do these attacks occur? . 13 4. Getting onto a user’s computer (part 2 – with a
    [Show full text]
  • Symantec™ Endpoint Detection and Response 4.4 Release Notes
    Symantec™ Endpoint Detection and Response 4.4 Release Notes Symantec™ Endpoint Detection and Response 4.4 Release Notes Table of Contents Copyright statement............................................................................................................................ 3 Symantec EDR documentation support............................................................................................ 4 What's new in Symantec Endpoint Detection and Response 4.4...................................................6 Important information about upgrading............................................................................................ 8 About software updates.................................................................................................................................................. 9 Performing an upgrade from the command line............................................................................ 10 Symantec EDR version support for appliances............................................................................. 11 Browser requirements for the EDR appliance console................................................................. 12 System requirements for the virtual appliance.............................................................................. 13 System requirements for Symantec Endpoint Protection integration......................................... 14 Required firewall ports.....................................................................................................................
    [Show full text]
  • Norton™ Internet Security
    Norton™ Internet Security Product Manual Norton™ Internet Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • 2012 Corporate Responsibility Report P
    2012 Corporate Responsibility Report p. 2 —— Symantec Corporation 2012 Corporate Responsibility Report Table of Contents 03 About Symantec 31 Your Information 05 Performance and Goals Table 33 Information Protection 07 CEO Letter 34 Cybercrime 09 Management Approach 35 Online Safety 11 UNGC Support & Activities 37 Privacy 12 Awards and Recognitions 38 Customer Satisfaction 13 Our People 39 Data Tables 15 Employee Satisfaction 43 About This Report 16 Talent Management 18 Gender and Diversity 21 The World Navigating This Report 22 Climate Change In this report, we organize our material issues and corporate responsibility programs into 27 Human Rights and three core categories that reflect the priorities Responsible Sourcing of our business and brand: Our People, The 28 Community Investment World, and Your Information. p. 3 —— Symantec Corporation 2012 Corporate Responsibility Report About Symantec As more and more of our personal and professional information is stored on We operate primarily in three diversified markets within the software sector— computers, mobile devices, and online networks, the protection of our digital security, backup, and storage management—and serve both consumers and identities, memories, and livelihoods has never been more important. businesses: At Symantec, that’s what we do: we protect the world’s people and information. • We provide consumers integrated solutions that take the hassle out of safely using the Internet by educating, alerting, and advising them about how to interact, shop, Symantec is a global leader in providing security, storage, and systems collaborate, and play safely online. We help them manage the proliferation of mobile management solutions to help our customers— from consumers and small devices, the need for identity protection, and the rapid increase of digital consumer businesses to the largest global enterprises—secure and manage their information data, such as photos, music, and video.
    [Show full text]
  • Norton™ Security: Producthandleiding
    Norton™ Security Producthandleiding Norton™ Security Producthandleiding De software die in deze handleiding wordt beschreven, wordt geleverd met een licentieovereenkomst en mag alleen worden gebruikt in overeenstemming met de voorwaarden in deze overeenkomst. Documentatieversie 22.17 Copyright © 2019 Symantec Corporation. Alle rechten voorbehouden. Symantec, het Symantec-logo, het keurmerkvinkje, Norton en Norton by Symantec, het Norton Secured-logo, LifeLock en het LockMan-logo zijn handelsmerken of gedeponeerde handelsmerken van Symantec Corporation of haar dochterondernemingen in de Verenigde Staten en andere landen. Andere namen kunnen handelsmerken zijn van hun respectieve eigenaars. Het product dat in dit document wordt beschreven, wordt gedistribueerd onder licenties waarmee het gebruik, het kopiëren, het distribueren en het decompileren/toepassen van reverse-engineering ervan wordt beperkt. Geen enkel deel van dit document mag worden gereproduceerd in enige vorm op enige wijze zonder voorafgaande schriftelijke toestemming van Symantec Corporation en zijn eventuele licentiegevers. DE DOCUMENTATIE WORDT GELEVERD 'ZOALS DEZE IS' EN ALLE EXPLICIETE OF IMPLICIETE VOORWAARDEN, REPRESENTATIES EN GARANTIES, WAARONDER IMPLICIETE GARANTIES VAN VERKOOPBAARHEID, GESCHIKTHEID VOOR EEN BEPAALD DOEL OF NIET-SCHENDING WORDEN AFGEWEZEN, TENZIJ DERGELIJKE DISCLAIMERS NIET WETTELIJK ZIJN TOEGESTAAN. SYMANTEC CORPORATION IS NIET AANSPRAKELIJK VOOR INCIDENTELE OF GEVOLGSCHADE IN VERBAND MET DE VERSTREKKING, PRESTATIES OF HET GEBRUIK VAN DEZE DOCUMENTATIE.
    [Show full text]
  • Norton 360 with Lifelock
    Norton™ AntiVirus Plus Norton™ 360 Norton™ 360 with LifeLock™ Norton™ 360 for Gamers User Manual Norton™ 360 with LifeLock™ User Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright © 2021 NortonLifeLock Inc. All rights reserved. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S.
    [Show full text]