Norton Malware Protection, antivirus, anti-spyware, anti-phishing, anti-ransomware, browser protection and more.
Norton Malware protection includes multiple defenses against viruses and malware.
Malware Norton protection has defenses for all types of malicious software, including viruses, Trojans, worms, etc.
Ransomware Norton protection helps protect against malware that encrypts a computer’s contents and then demands a ransom to restore them.
Spyware Norton protection detects software that tracks and sends personally identifiable information or confidential information to third parties.
Adware Norton protection helps block malware that’s designed to display unwanted advertisements.
Malvertising Norton protection detects when malware is hidden behind online ads.
Trojan horse Norton protection helps block Trojans that appear to be something they are not, often containing a backdoor component for future access
Phishing Norton protection has tools to detect phishing attempts, which are seemingly safe links that take users to malicious sites that gather personal data and login credentials, and can be found within websites, emails or even ads.
Pharming Similar to phishing attacks, Norton protection detects pharming attacks that redirect users from a legitimate site to a malicious one.
Browser hijacker Norton protection helps protect your browser against malware that changes your browser's settings, or re-directs your web traffic.
Rootkit Norton protection helps protect against rookits that can enable an unauthorized user to gain control of a computer system without being detected.
Spam emails Norton protection filters out spam emails on Outlook email clients.
Banking Trojans Norton protection helps block and remove trojans that are known to target banking sessions.
Coin-miner Norton protection helps block malware that uses someone else’s computing resources to run a coin mining script without the user’s consent (e.g. cryptojacking).
Downloader Norton protection helps block online threats that call their C&C (command and control center) in order to download additional malicious payloads.
Exploits Norton protection helps block specific techniques that are abused by malware.
Fileless threats Modern online threats leave no traces in file system by leveraging scripts and in-memory execution. Norton protection detects and helps remove them.
Formjacking attack Norton protection helps block attempts to steal credit cards at online checkout.
Keyloggers Norton protection helps stop online threats that attempt to steal keystrokes.
Man-in-the-middle browser attacks Norton protection detects malware that hijacks a web session.
PUAs (Potentially Unwanted Applications): Norton protection detects browser extensions or apps that are known to cause issues and uninstalls them.
Script-based attacks (JavaScript, VBA, VBS, Powershell): Modern online threats use scripting languages instead of using files that are executables. Norton protection detects and helps block such attacks.
Social Networking Scam Norton helps block like-jacking, a type of clickjacking, at Facebook.
Tech Support Scam Norton helps block websites that mimic official support of organizations.
Unwanted browser extensions Norton IPS helps block malicious traffic caused by browser extensions.
Virus Norton protection helps block harmful software that replicates itself and spreads itself to other devices.
Worm Norton protection helps block malware that replicates itself without using a host file (unlike viruses, who use a file).
Norton Malware Protection
Intrusion Prevention System (IPS) Analyzes information arriving from a network (like the Internet) and helps block potential online threats before they hit your computer. (PC, Mac)
AntiVirus with Advanced Machine Learning Scans and helps remove malware files that enter a device, using emulation to test and see what files do, and machine learning. (PC, Mac, Android)
Reputation Protection (Insight) Uses the reputation information gathered from Symantec’s Global Intelligence Network to classify software application files on their attributes. (PC)
Behavioral Protection (SONAR) Uses artificial intelligence to classify applications based on behavior, and automatically helps block applications that display suspicious behavior. (PC)
Proactive Exploit Protection (PEP) Helps protect against ‘zero-day’ attacks that exploit vulnerabilities in applications or the operating system. (PC)
Power Eraser Helps detect and lets you remove high-risk applications and malware that may be residing on your computer. (PC)