• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Kudos0

How to Counterattack Mobile App Security Risks and Stay Protected

The mobile apps we use can provide other parties access to our information and everything on our devices. Our smart devices are powerful computers, containing valuable information, such as passwords, contacts, phone numbers, photos, videos, and maybe even banking details. Thus, it’s very important to understand the privacy and security implications that come with using any app. Guard your information by exercising caution and by taking three simple steps.

Read More
Kudos0

How do Hackers Steal Passwords: #30SecTech Video

Passwords are to a hacker like keys to a thief. Although keys and passwords by themselves don’t have much value, the personal information and property that they can expose does. Think of your passwords as your digital keys. They allow access to your personal life, including your networks of friends and colleagues, contacts, photos, videos, emails, and maybe even banking and payment details, among other gems of information....
Read More
Kudos0

Six Key Strategies To Boost E-Commerce Sales This Holiday Season

In the world of e-commerce, cybersecurity, trust and sales are all interrelated, each influencing the other. The more trust indicators you display on your website, the more trust you gain, and the more trust you gain, the more sales you win. Consumers are willing to spend more during the winter holidays than at other times of the year, and online shopping has grown rapidly over the last decade. In fact, a survey conducted by the National Retail Federation revealed that 56% of US consumers expect to do some or all of their holiday shopping online this year, while 44% plan to do all of the...
Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream med...
Read More
Kudos0

WireLurker Malware Affects Apple Devices. Learn More.

Situation overview: Yesterday, security firm Palo Alto Networks, reported on a new family of malware that affects Apple’s OS X and iOS devices called WireLurker.  WireLurker has been used to inject malicious code into Mac applications hosted on a third party Mac app store in China. Once these trojanized apps are downloaded onto a Mac, WireLurker waits for an iOS device to connect via USB and then installs and runs similarly infected iOS apps on the connected iOS device.  In many cases users might not see any difference since the iOS app will operate just like the legitimate version. How...
Read More
Kudos0

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More
Kudos0

Pandora #BoldlyGo Concert Series feat G. Love & Special Sauce

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans! HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA Date: Tuesday, November 11th, 2014 Time: Doors at 7:00 pm Location: 777 Valencia St, San Francisco, CA 94110 Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at The Chapel in San Francisco, CA...
Read More
Kudos2

The Real Cost of Free: #30SecTech Video

You may wonder why you should pay for security software when there are plenty of free options. We are increasingly connected to the Internet through our devices, thus it’s no surprise to see recent data breaches making headlines. This media coverage has made us more aware of the security issues that may be lurking behind our screens. Although we may realize the importance of practicing caution, the easiest way to remain protected is still by adding a security solution to our devices. There are two basic options to protect yourself and your devices. One option is to install a free solution...
Read More
Kudos1

Cookies and Your Online Privacy: #30SecTech video

Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out....
Read More
Kudos2

Traveling? Don’t Let Your Mobile Data Stray

Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data. 

Read More
Kudos3

Shellshock, The Latest Mac OSX and Linux Vulnerability—And What It Means For You


Security researchers have discovered a new bug, called, Shellshock, that affects Linux and Unix platforms. If exploited, the bug could impact public facing web servers and Mac OSX users. Our experts let you know what you can do to keep your data safe.

Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos8

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves....
Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos0

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos2

New Windows Zero-day Exploit via Cyberespionage Group Sandworm Discovered

A new vulnerability was discovered in Microsoft Windows Operating Systems, affecting all supported versions of Windows that will deliver malware via PowerPoint documents. Symantec considers this vulnerability critical since it allows attackers remote access to the affected computer.

Read More
Kudos1

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.

Read More
Kudos1

My Account May Have Been Hacked—What To Do Now?

You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox. Regardless of where the leak originated, this is something we see all too often in the tech and business headlines lately. High pr...
Read More
Kudos0

Norton business announcement. Norton continues to Go Boldly

Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...

Read More
Kudos1

BYOD And Protecting Your Mobile Workforce

BYOD is growing in popularity within small businesses. In this article we will discuss how to let your employees use their own devices and keep your company's data safe.

Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10  in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On th...
Read More
Kudos0

Cyber Security Concerns and Smartphones

More people own smartphones than PCs in today's market, and that makes the mobile platform extremely desirable to cybercriminals. Learn how to secure your personal data.

Read More
Kudos2

Exactly How Free Is That Free App?

There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.

Read More
Kudos1

Mobile Scams: How-to Identify Them and Protect Yourself

With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.

Read More
Kudos1

How To Protect Yourself From Cyberstalkers

With the wealth of information available online, this makes it easier for Cyberstalkers to gain access to their victims. Read on to learn about ways to keep your personal information hidden from unwanted eyes.

Read More
Kudos1

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.

Read More
Kudos1

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.

Read More
Kudos2

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.

Read More
Kudos2

The New Norton

Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.

Read More
Kudos1

The Worm in the Apple, Part 3 - How to Secure Your iPhone and iCloud in Light of Recent Photo Leaks

We're sure you've heard about the multitude of celebrity photos that were leaked from iCloud accounts. Read on to find out how it was done, and how you can secure your own iCloud account to make sure something like that doesn't happen to you.

Read More
Kudos1

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus. There are the obvious precautions to take in protecting your devices, such as never leaving ...
Read More
Kudos1

Android AOSP Browser Bug Could Affect 75 Percent Of Users

A new Android vulnerability, which could allow attackers to view open Web pages on the victim’s Android Web browser or hijack their online accounts, has recently been uncovered, and may impact an estimated 75 percent of android users.   Uncovered in early September, by security researcher, Ray Baloch, the Google Android Browser Same Origin Policy Security Bypass Vulnerability (CVE-2014-6041) reportedly affects any Android version below 4.4. The bug, found in the Android Open Source Project browser (or AOSP browser—a browser that Google no longer supports), could be exploited by an attacker...
Read More
Kudos1

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos1

Data Breach - The Best Defense is Vigilance

There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is understanding what the thieves are after, so you can make it harder for them to win. Egan answers some commonly asked questions about shopping and credit card safety: So what is being stolen and how is it being used? In point of sale (POS) breaches, thieves are stealing your 16-digit credit card numbers. Those numbers are most useful to thieves (and m...
Read More
Kudos1

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More
Kudos2

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 websites through botnets (computers that have been infected with and controlled by a computer virus). The sites ranged from small sites to larger household names. Many of the targeted sites are still vulnerable....
Read More
Kudos1

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this “news” may not be what it seems....
Read More
Kudos0

Back Up Your Finals and Midterms to the Cloud

In today’s fast-paced world, you can be sure that most universities have gone digital. As a result, more students are saving their important papers on their computers and external hard drives. However, from what I’ve seen, that’s about as far as most students go to safeguard their work. With so many hours (and lost sleep) going into these papers, it is essential to make sure you have it backed up in the cloud, because there would be nothing worse than losing all of your hard work due to a computer crash or hard drive failure. If you only save your work on a hard drive, once your computer ...
Read More
Kudos0

How to Spot a Fake Android App

Malware on mobile devices is rampant. CNN reports that 55% of Internet traffic in January was on mobile devices, so it seems natural that cybercriminals target mobile, often devising scams using the apps that are most familiar to users.  Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games. Recently, Symantec discovered cyber scammers attempted to impersonate Norton products, and, while imitation is the sincerest form of flattery, we...
Read More
Kudos0

Stop Stressing: 10 Internet Safety Rules To Help Keep Your Family Safe Online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the Internet also has the potential to harm us, and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real....
Read More
Kudos0

Mobile Security Advice For The New Term

Technology and education now go together more closely than ever, with laptops and tablets now regular sights in classrooms. The range of educational apps in both the iOS App Store and the Google Play Store is huge and growing all the time, and the cloud has made it possible to learn across multiple devices with ease....
Read More