Norton Mobile Security Lite Free for Android Mobile Users

Norton Mobile Security Lite Free Download in Android Market

New mobile security application protects from loss, theft and malware.

https://market.android.com/details?id=com.symantec.mobilesecurity 

 

norton mobile security

A few weeks ago, Norton announced the launched of Norton Mobile Security Lite. The massive growth of Android Market, shows that consumers are hooked on downloading applications on what they want. Timely, Norton Mobile Security Lite will be a great security application for mobile consumers to help safeguarding mobile phones from Internet Security Threats. From Symantec’s latest Internet Security Threat Report, Volume 16, found that researchers identified nearly four times as many unique-to-Android pieces of malware than the previous year.  The need to protect consumer mobile devices is more important than ever.

Read more

How to protect your PC from Trojans, Viruses, and Worms Threat.

What are Trojans, Viruses and Worms?

Viruses, Trojans, Worms and other cyber threats are now a part of daily life. Malware spreading throughout the Internet, hackers stealing confidential data and mailboxes flooded with spam are the price we pay for computing convenience. Any unprotected computer or network is vulnerable.

Read more

How to Remove W32.Downadup.B Virus?

W32.Downadup.B Virus was discovered by Symantec last December 30, 2008, and was announce to public January 9, 2009. Now it widely spreading all over the world and it floodings network connections.

This virus monitors DNS requests to domains containing certain strings and blocks access to those domains so that it will appear that the network request timed out. We (my MIS Team) discovered W32.Downadup.B Virus from our quarantine logs and we found out that it was introduce to the network using a USB drive activated by autorun.inf.


W32.Downadup.B creates an autorun.inf file on all mapped drives so that the threat automatically executes when the drive is accessed. The threat then monitors for drives that are connected to the compromised computer in order to create an autorun.inf file as soon as the drive becomes accessible.

Read more