{"id":1414,"date":"2005-05-05T00:00:00","date_gmt":"2005-05-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/05\/symantec-launches-anti-spyware-beta\/"},"modified":"2021-12-30T11:39:20","modified_gmt":"2021-12-30T11:39:20","slug":"symantec-launches-anti-spyware-beta","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/05\/symantec-launches-anti-spyware-beta\/","title":{"rendered":"Symantec launches anti-spyware beta"},"content":{"rendered":"<p>Symantec has launched the beta test version of its anti-spyware application, which will be sold from June as part of its Norton Internet Security 2005 application.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Norman Kohlberger, senior regional product manager for Symantec Asia Pacific, said the main aim of the new product, which will be called Symantec Internet Security AntiSpyware Edition, was to make PC security as easy as possible for the end user.  &#8220;What we are doing is reducing the complexity,&#8221; said Kohlberger.  He said the new edition was an improvement on its predecessor because it not only protected the users&#8217; personal data, but included real-time spyware and adware scanning.<\/p>\n<p>Kohlberger said security vendors had to keep improving their products because the next generation of malware is being developed by organised criminals intent on making money from their victims.<\/p>\n<p>http:\/\/www.zdnet.com.au\/news\/security\/0,2000061744,39190671,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1414","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1414"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1414\/revisions"}],"predecessor-version":[{"id":3901,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1414\/revisions\/3901"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}