<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:georss="http://www.georss.org/georss">
  <channel>
    <image>
      <title>ReleaseWire</title>
      <url>http://media.releasewire.com/photos/show/?id=68004&amp;size=small</url>
      <link>http://www.releasewire.com/</link>
    </image>
    <title>Norton Scientific Reviews - Latest Press Releases on ReleaseWire</title>
    <link>http://www.releasewire.com/company/norton-scientific-reviews-35432.htm</link>
    <description/>
    <language>en-us</language>
    <link xmlns="http://www.w3.org/2005/Atom" href="http://sbwire.superfeedr.com/" rel="hub"/>
    <link xmlns="http://www.w3.org/2005/Atom" href="http://feeds.releasewire.com/rss/full/company/35432" rel="self"/>
    <item>
      <title>Norton Scientific Reviews: Google Accused of Bypassing Cookie Protection</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p>Winnipeg, Canada -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 04/02/2012 --  Google is apparently guilty of bypassing default privacy settings in browsers to install tracking cookies. Such cookies will enable Google to track the web activity of users using Safari (i.e. any Apple devices), something that the search engine company claimed as an accident. However, Microsoft announced that Google is also doing the same thing in their browser, Internet Explorer. (And as it turned out, it&apos;s not only Google that is guilty of overriding privacy settings but also Facebook.)<br />
<br />
Browsers that have P3P are capable of blocking or allowing cookies depending on the privacy settings of the user. The thing is, P3P only depends on websites to give a description of them such as what they will do with data they will get from tracking users. By default, IE blocks third-party cookies unless the website shows a P3P Compact Policy Statement showing how it intends to use the cookie and promising not to track the user.<br />
<br />
In effect, Google is committing a scam by tricking the browser by sending a text that will enable 3rd-party cookies to be allowed. Google denies tracking of users but admits that it unintentionally places ads cookies on smartphones against the user&apos; wishes.<br />
<br />
Microsoft has already called the attention of Google and requested them to commit &apos;to honoring P3P privacy settings&apos; of all browsers. Google responded that Microsoft&apos;s dependence on P3P is forcing modern sites to adopt their old practices. Besides, they said, 11,000 sites have been found to be bypassing the P3P in IE in the last 2 years.<br />
<br />
Companies have found out and are exploiting a bug in IE that does not block them even if they have an invalid privacy statement. Here&apos;s how the bypass works: the only websites that are being blocked are those that deliberately identify themselves as ad providers. And any website that does not describe itself to the browser is given a pass to install a tracking cookie anyway.<br />
<br />
They can practically lie about their P3P policies and no one would bother to do anything about it. Talk about a silent scam.<br />
<br />
Generally, IE9 will block websites from installing cookies (tracking files) for other sites. For instance, Google should not be able to install a cookie for their advertising site DoubleClick. However, there is an exception: IE9 will permit websites to install 3rd-party cookies if they show P3P (Platform for Privacy Preferences).<br />
<br />
P3P is some kind of a recommendation from the WWWC that websites should use to summarize their privacy policies. But this official suggestion has been generally taken for granted in the past 10 years, with major sites like Twitter, CNN, Apple and Google choosing not to use it in describing their privacy policies.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Norton Scientific Reviews<br />Telephone: 204-926-8500<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/134766">Click to Email Norton Scientific Reviews</a><br />Web: <a rel="nofollow" href="http://nortonscientificreviews.com">http://nortonscientificreviews.com</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=134766&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 02 Apr 2012 13:36:09 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Norton Scientific Reviews Source Code Leaked by Hackers</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">A group of hackers who call themselves the Lords of  Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer.</p><p>CanWest Global Place, Winnipeg -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 02/10/2012 --  A group of hackers who call themselves the Lords of  Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer.<br />
 <br />
The release of the source code came after the &apos;extortion&apos; attempt failed as Symantec did not comply with their numerous deadlines.<br />
 <br />
Negotiations through email messages between a representative of the hacker group, YamaTough, and someone from Symantec were also released online. The exchange of messages are about Symantec&apos;s offer to pay USD 50,000 for the hackers to stop disclosing the source code and announce to the public that the whole Symantec hack was a fake, which made them a subject of mockery for appearing to buy protection.<br />
 <br />
Both sides admitted that their participation was just a trick.<br />
 <br />
The hackers denied any extortion aim, saying that they never intended to take the money and were going to publish the source code whatever happens; they simply want to humiliate them so they played along. While Symantec said that they are not actually the one in communication with the hacker, but a law enforcement agent.<br />
 <br />
The long negotiation worked to the favor of Symantec as they have been able to come up with patches to theirNorton and pcAnywhere programs. Symantec has advised their users to stop using the softwares in the meantime until they have issued more patches for them.<br />
 <br />
Symantec released a statement saying that they have always been prepared for the leak of the source code so they&apos;ve made and distributed hotfixes on January to secure their users.<br />
 <br />
The drawn-out negotiation is an obvious sign of a law enforcer on the other line. Delaying tactics is one of their assets to obtain insight into the enemy. More importantly, it will create more transactions where paper trail will be left along the way -- utilizing persons who have been involved in the process and the records themselves to trace the suspects.<br />
 <br />
It has been a common ploy of investigators like the FBI who deal with kidnappers or extortionists to break down the amount into several smaller payouts.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Norton Scientific Reviews<br />Telephone: 204-926-8500<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/126457">Click to Email Norton Scientific Reviews</a><br />Web: <a rel="nofollow" href="http://nortonscientificreviews.com">http://nortonscientificreviews.com</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=126457&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Fri, 10 Feb 2012 11:13:50 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Norton Scientific Reviews Facebook Sues Spammer</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Security experts from Norton Scientific Reviews have made huge progress against malware and spam attacks and they seem to be intent in completely eliminating it.</p><p>CanWest Global Place,, Winnipeg -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 02/03/2012 --  Security experts from Norton Scientific Reviews  have made huge progress against malware and spam attacks and they seem to be intent in completely eliminating it.<br />
<br />
Social networking giant Facebook sues a marketing company, Adscend Media on grounds of alleged &apos;clickjacking&apos; and spreading spam through deceptive tactics.<br />
<br />
The alleged illegal activity involves putting up posts on Facebook that include codes, causing the links to appear on the users&apos; walls as a liked item. Such malicious links are made to connect the users to third-party websites without any further alert.<br />
<br />
On the other hand, Adscend Media &apos;vehemently denied&apos; the &apos;false claims&apos;.<br />
<br />
Facebook says it will constantly use all tools in their disposal to make sure that scammers will not make profit by misusing their services.<br />
<br />
Also filing a related lawsuit was State of Washington -- an unprecedented case of a state going to court to fight spam on a social network.<br />
<br />
Adscend Media reportedly had earned up to USD 1.2 million per month from the racket.<br />
<br />
But the accused company issued a statement denying their engagement in any activity indicated in Facebook&apos;s complaint.<br />
<br />
According to Adscend Media, they &apos;strictly comply&apos; with legal responsibilities under federal law and they are also conducting their own investigation on the validity of Facebook&apos;s accusations. However, they asserted that even if they did find something that might implicate truth in the allegations, the activity must have been done without the company&apos;s knowledge.<br />
<br />
The firm added that they find it troubling that the Attorney General&apos;s office already made a public spectacle of such accusations even without consulting with or giving alert to the company, which is supposed to be part of due process.<br />
<br />
Adscend Media responded with an intent to pursue defamation act against the entities accountable for marring their company&apos;s reputation.<br />
<br />
According to Norton Scientific Reviews, around 4% of the content shared on the site is spam.<br />
<br />
Facebook has attempted to use anti-clickjacking tactics to combat the spam problem but something have yet to come out as effective.<br />
<br />
This has been the second incident in a single month that Facebook accused a group of engaging in illegal activities on their site. Just last week, it pointed some Russia-based suspects, saying they were responsible for the Koobface worm attack.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Norton Scientific Reviews<br />Telephone: 204-926-8500<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/125596">Click to Email Norton Scientific Reviews</a><br />Web: <a rel="nofollow" href="http://nortonscientificreviews.com">http://nortonscientificreviews.com</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=125596&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Fri, 03 Feb 2012 11:51:04 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
  </channel>
</rss>
