Norton, a business unit of Symantec Corporation has launched an updated version of mobile security platform which offers a ‘Report Card’ like feature providing automatic security and privacy analysis. And this security software will be available to Android version loaded mobile phones on an exclusive note.
As mobile applications can access and control large amounts of personal data and stored content on user phones, malware spreading cyber crooks are coming up with malicious tools which can be hidden inside the applications to steal personal information and make a profit.
Norton Mobile Security is having a robust App Adviser feature, which renders android phone users a proactive protection tool against malicious apps and other sophisticated threats on android devices.
Frankly speaking, most of the new features have been redesigned by Norton and this includes the Report Card feature which has been integrated with the existing Safe Search and Web Protection characteristics.
The new Report Card feature available on Norton Mobile Security which is exclusively poised for Android users has the ability in providing a 360-degree view of security and privacy status. Subscribers of this feature rich security platform can take full advantage of the Privacy Report to see whether the photos and other critical info on their devices are safe and secure.
The feature also reports details of potential privacy vulnerabilities, like past insecure Wi-Fi connections, so that Android phone users can understand what type of data might be at risk and course correct it in time.
Furthermore, Norton Safe Search and Web Protection traits keep users isolated from malware infected sites and helps in blocking phishing campaigns.
Thus, users can stay safe from ransomware threats with the onboard security software.
Note- Ransomware is a malicious software tool which creeps into the database and locks the access of files and folders until a ransom is paid to the hacker or the person spreading the malware. As soon as the ransom is paid, an unlocking key will be passed on. But in the world of cyber espionage, there is no guarantee that the key will be passed on to the user for sure.