• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced
Kudos0

Stolen Funds From Starbucks Customers Another Reminder to Use Unique Passwords

It’s all over the news: headlines claiming that Starbucks was hacked or that hackers broke into the Starbucks mobile app. What is true is that cybercriminals are targeting Starbucks accounts, but not because of a breach. We suspect that these accounts are being targeted because of weak customer passwords or user credentials obtained from other data breaches....
Read More
Kudos1 Stats

What is the Difference Between Black, White and Grey Hat Hackers?

Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission.  Many companies and government agencies actually employ hackers to help them secure their systems....
Read More
Kudos4 Stats

SSL Certificates: What Consumers Need to Know

Guest post by Jeff Barto, Trust Strategist, Evangelist & Website Security Advocate for Symantec In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates- otherwis...
Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.....
Read More
Kudos5 Stats

What Is a Virus #30SecTech

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order ...
Read More
Kudos1 Stats

Spring Cleaning to Secure Your Digital Life

Tidy Up Your Digital Life It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started: Cleanup your PC workspace: Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized.   Get organized: Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folders t...
Read More
Kudos2 Stats

Be Still My Bleeding Heart: The Latest OpenSSL Vulnerability Is Nothing To Worry About

On March 19th, 2015, website developers who use OpenSSL learned of several bugs, including a severe bug that could allow hackers to render a webserver or website unavailable to users. What is OpenSSL? The “Open” in OpenSSL means that any developers can work on the code in the project. The SSL refers to secure sockets layer, which is a form of security built into a web browser that is used to encrypt and decrypt data being sent across the web. How does this affect me? Luckily, this exploit has not been seen in the wild, however, if the vulnerability is exploited, it can take down bo...
Read More
Kudos2 Stats

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information. Exploit Kit Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through that...
Read More
Kudos2 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not mal...
Read More
Kudos1 Stats

What is Social Engineering?

We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack. Types of Social Engineering Attacks Social engineering is a way that cybercriminals use human-to-human interaction in order get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that attackers can try to trick yo...
Read More
Kudos1 Stats

Spring Break and Mobile Device Safety

Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; t...
Read More
Kudos0

Public Wi-Fi Security 101: What Makes Public Wi-Fi Vulnerable To Attack And How To Stay Safe

Nowadays, free public Wi-Fi is widely and readily available in larger cities—airports, restaurants, coffee shops, libraries, public transport, hotel rooms, you name it. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. However, the security risks should not be forgotten. While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be aware...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause muc...
Read More
Kudos1 Stats

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. While ...
Read More
Kudos2 Stats

How do Zero-Day Vulnerabilities work: #30SecTech

What is a software vulnerability? In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that can be exploited by cybercriminals. Why do vulnerabilities pose security risks? Hackers write code to target a specific security weakness and package it into exploit malware, a type malicious software that takes advantage of a vulnerability in order to compromise a compu...
Read More
Kudos1 Stats

New "FREAK" Vulnerability Can Allow Attackers To Decrypt Encrypted Communications

A newly discovered vulnerability, dubbed, “FREAK”, that could allow attackers to intercept and decrypt encrypted traffic between browsers and web sites via a Man-in-the-Middle (MitM) attack, was discovered on March 3rd, 2015 by researchers. Once an attacker has cracked the encryption code, it is possible for the attacker to steal passwords and other sensitive personal information....
Read More
Kudos2 Stats

What Is A Man In The Middle Attack?

In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data ...
Read More
Kudos2 Stats

Norton Mobile Security Receives AV-TEST Innovation Award

Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape. As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that se...
Read More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy. What is ridesharing? Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button.  In ad...
Read More
Kudos6 Stats

Symantec Partners With Europol In Ramnit Botnet Takedown

On February 25th, 2015, with the help of Symantec and other industry partners, Europol was able to seize servers used by the cybercriminal group behind the Ramnit Botnet. The group has been in operation for over five years, allowing the Ramnit threat to infect 3.2 million computers in total, with up to 350,000 compromised computers at the present time. Symantec’s security research helped Europol seize the infrastructure behind the threat. This group’s main function had been to steal log-in credentials and cookies to impersonate the victim, enabling them to steal data from the hard drive....
Read More
Kudos3 Stats

Are Your Devices Listening In On Your Conversations?

Is it time to start speaking in code in your living room? Recent tech buzz has fingered voice control on your smart TV as a security risk, listening in on your conversations in order to utilize voice commands, and then sending that information out to third parties. The thought of “always listening” devices using voice commands can seem like a scary thing; however, it’s not as scary as it sounds, just yet. Still it’s important to be aware of potential risks as the growth of speech-to-text technology will more frequently become integrated into new devices entering the market. Protect Your...
Read More
Kudos2 Stats

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now. What can cybercriminals do with my data in the event of a banking or financial institution breach? Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank ac...
Read More
Kudos1 Stats

Online Dating and Protecting Your Privacy

This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers. What are the risks? As with anything you post online, it’s out there for everyone to see, so you will want to be careful with what identifiable information you us...
Read More
Kudos2 Stats

Lunar New Year Online Security Tips

It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online. Norton wishes you an exciting (and secure!) year ahead!
Read More
Kudos2 Stats

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future. Corporations and even smaller businesses are an extremely attractive target to cybercriminals, simply due to the large payday of data that can be stolen. ...
Read More
Kudos2 Stats

New Internet Explorer Vulnerability Exposes Serious Phishing Hole

A new zero-day vulnerability in Internet Explorer could potentially allow attackers to steal log in credentials.

Read More
Kudos5 Stats

New Adobe Flash Zero-Day Exploit Discovered in Malvertisements

A new Adobe Zero-day exploit was discovered by Trend Micro on February 2nd, 2015. A Zero-day exploit is when there is an unpatched bug in a software program that allows hackers access to inject malware into your computer.   How Can Cybercriminals Infect My System? In this particular case, the malware is delivered via malvertising, which is a form of an attack that uses legitimate online advertising networks to deliver malicious code onto your computer.  Unfortunately, you don’t even have to do anything to be infected by this kind of malvertising, as it often uses a drive-by-download; w...
Read More
Kudos3 Stats

Norton's Support Commitment And Our Virus Protection Promise

Norton is the leader in digital solutions and we have the best in class digital security solutions available on the market today that’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise.  Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you with support whenever you need it most. We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-ups,...
Read More
Kudos4 Stats

Data Privacy Day 2015

What is Data Privacy Day? Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint. DpD is a series of events online and offline intended to bring awareness of the importance of privacy and how to protect it. Why is Privacy Important? There are many reasons why maintaining your privacy online is important. Protecting your privacy helps impede the theft of financial information and identities. However...
Read More
Kudos5 Stats

Why I Do It: A Support Agent’s Tale

Why I Do It: A Support Agent’s Tale Why I do it I have always loved computers. I also worked in health care for ten years, and that gave me a wonderful perspective on helping people. I have been able to carry over that experience to my current position as a Norton Technical Support Agent and it provides me with the ability to offer my customers a positive experience in the middle of a stressful situation.  It's always a great feeling when I finish a call, and someone who used to be really upset is now really happy. Saving digital lives I remember one customer who had a threat that m...
Read More
Kudos2 Stats

Adobe Flash Zero-Day Vulnerability Discovered

A new zero-day vulnerability has been discovered in Adobe Flash. Security researcher Kafeine reports that this  vulnerability is currently being exploited in the wild. The term zero-day refers to an unknown vulnerability or an exploit in a software program that the developer of the software is newly aware of, and has not had the time to address and patch. Zero-days are particularly troublesome because they often present an open window during which cybercriminals can operate unchallenged. Because of this, zero-days are prized by cybercriminals who have knowledge of them and are used for a...
Read More
Kudos2 Stats

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts. In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company’...
Read More
Kudos3 Stats

Top 10 Small Business Resolutions & Strategies To Achieve Them

With the New Year ahead, and cyber threats continuing to loom over businesses, 2015 will likely bring more sophisticated and complex attacks. Security analysts called 2013 “The Year of The Mega Breach.” According to Symantec’s 2014 Internet Security Threat Report, businesses saw a 91 percent increase in targeted attacks and a 62 percent increase in the number of breaches. Additionally, the recent string of credit card breaches targeting major retailers also provide further reminder that cybercrime remains prevalent and that cyber threats show no sign of slowing down. The exploitable vulne...
Read More
Kudos3 Stats

How To Avoid Scams When Buying Norton Security Software This Holiday Season

If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your digital and personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software. If your goal is to protect your devices and your identity, you can’t afford to take chances. There are two things you can do to avoid purchasing fraudulent security and antivirus software. First, do your research, educate yourself, and be cautious. Second, purchase...
Read More
Kudos2 Stats

Think Twice Before Forgoing Security on The Connected Devices You Receive—or Gift—This Holiday Season!

With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped your list of things to buy. As you search with excitement to find the device that best fulfills your needs, the thought of installing security software on them might not be at the forefront of your mind. However, considering that an alarming 63 percent of mobile device owners fell victim to cybercrime in 2013, it’s important to take steps to keep the information on your mobile devices secure. Past events continue to substantiate that securing all connected devices is the smartest and easiest w...
Read More
Kudos2 Stats

New Years Security Resolutions

While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life. Software Updates- Install Early, Install Often Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out b...
Read More
Kudos1 Stats

New Year’s Resolutions – There’s An App For That!

As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful th...
Read More
Kudos1 Stats

Get to Know Firewalls 101 - #30SecTech

As the name implies, a firewall is a protective barrier and its job is similar to that of a physical firewall. They stand between your computer and the rest of the digital world to keep you protected from online threats. A firewall is a software program or piece of hardware that secures your computer by limiting who can send you information. All information entering or leaving a network passes through a firewall, which either allows or blocks information based on specified security criteria....
Read More
Kudos2 Stats

Holiday Security Tips: an Online Shopping Checklist

We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores. Remember these key tips to shop safely online: Don't click on unsolicited emails or links to "deals" that seem to good to be true. Use the latest, updated version of your internet browser. Check to ensure your purchases and transactions are taking place on a secure site. Read more: The 12 Scams of Holidays Past What is the Safest Way to Pay This Holiday Season?
Read More
Kudos4 Stats

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.

Read More
Kudos1 Stats

Secret Life Of Your Mobile Apps Infographic

A Symantec study found that consumers who were most concerned about privacy and security were least likely to be vigilant about what and how information was being used by their free apps.

Read More
Kudos3 Stats

Study Finds Mobile Privacy Concerns Often Traded for Free Apps

Newly released Symantec research indicates that most consumers worry about mobile app security and privacy risks. However, most consumers unknowingly – sometimes even willingly – put personal information at risk, compromising their own privacy. In fact, the study found that many of those who worry the most about mobile privacy are the least likely to take precautions to protect themselves—all  in exchange for free app downloads.

Read More
Kudos3 Stats

Rethinking Wearable Technology In An Era of Physical-Digital Innovations

Experiencing and using the latest innovations in technology is always exciting—and wearable devices are no exception. Driven by technological advances, social factors, and the Internet of Things, consumers everywhere are enthusiastically embracing wearable technology. As a result, being connected to the Internet is becoming a part of daily life, creating a reality where the physical and digital worlds intersect and overlap at an unprecedented rate, often leaving security behind. Physical-Digital Innovations Allow Us To Experience The World In Unprecedented Ways Connected consumer...
Read More
Kudos2 Stats

Pandora #BoldlyGo Concert Series feat Thurston Moore

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans! HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY Date: Thursday December 11th, 2014 Time: Doors at 7:00 pm Location: Marlin Room @ Webster Hall Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at Marlin Room @ Webster Hall 12/11/2014 ...
Read More
Kudos4 Stats

Point of Sale Malware Attacks Explained - #30SecTech

As consumers around the country get ready for another holiday shopping season, hackers are likely gearing up with Point-of-Sale (POS) malware kits. Over the past year many US retailers—big and small—fell victim to mega-breaches that compromised approximately 100 million payment cards, potentially affecting about one-third of US consumers. Some retailers have taken measures to secure their POS terminals, but until a complete transition to more secure payment technologies is made, many retailers are still vulnerable to POS attacks. Therefore, it is up to consumers to remain vigilant against...
Read More
Kudos4 Stats

Keep Everyone Protected When Handing Down Mobile Devices This Holiday Season

It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists. And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season. Protect your holiday hand-me-downs To many consumers handing down or selling their device may seem like a harm...
Read More
Kudos0

The 12 Scams of Holidays Past

On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!

Read More
Kudos1 Stats

Securing the Internet of Things - #30SecTech video

Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT)....
Read More
Kudos1 Stats

Happy Thanksgiving!

Read More