• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

National Clean Out Your Computer day-The Importance of Clean Computing

February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.”  For centuries, this saying applied to tasks like scrubbing the floors and dusting the bookcases. Today, however, it applies to your computer just as much as it does to your house. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs. Why Clean? Cleaning both your computer’s hardware and its software matters.  Clean hardware helps...
Read More
Kudos1 Stats

Is Personal Data Really Gone When It’s Deleted from a Device?

Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a computer’s hard drive. But what really happens to all that data? Where does it go, and is it really gone forever?...
Read More
Kudos0

Three Easy Steps to Protect Your Android

You could call mobile devices the new frontier for malware. Malware often appears on mobile devices in the form of an app. These apps sometimes include malicious code that makes the app do things it’s not supposed to do – such as broadcast your location information while you’re searching local maps....
Read More
Kudos0

What Personal Information Should You Safeguard?

Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you. Let’s review this information to help you protect yourself as much as possible:...
Read More
Kudos0

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe....
Read More
Kudos1 Stats

8 Cyber Security Tips for Business Travelers

Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet....
Read More
Kudos2 Stats

What Is a DDoS Attack? - #30SecTech by Norton

A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. 

Read More
Kudos1 Stats

7 Dos and Don’ts of Secure Online Tax Filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it. As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, t...
Read More
Kudos1 Stats

Data Privacy Day 2016: Ten Ways to Keep Your Data Private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. One can’t assume your phone and the information it stores is safe from the malicious intentions of the human mind. Data Privacy Day (DPD), is an international effort held annually on January 28 in order to help...
Read More
Kudos1 Stats

Variant of Android Ransomware Uses Shady Tactics to Trick Users Into Giving Away Administrator Rights

Symantec has found a variant of Android ransomware that uses clickjacking tactics to try and trick users into giving the malware device administrator rights.. As well as encrypting files found on the compromised device, if administrator rights are obtained, the malware can then lock the device, change the device PIN, and even delete all user data through a factory reset....
Read More
Kudos1 Stats

PC or Mac: Which Is More Resistant to Cyber Threats?

Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on....
Read More
Kudos2 Stats

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats. Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same perso...
Read More
Kudos3 Stats

The 5 Stages of Phone Loss Grief

It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat....
Read More
Kudos0

Thousands of Websites Have Been Compromised With Malicious Code

Symantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website. Of the compromised websites, 75 percent were located in the U.S. An injection attack relies on injecting data into a website in order to execute malicious code. It is then triggered when a user browses to the compromised website. Luckily, Symantec did not identify any malware associated with this attack....
Read More
Kudos2 Stats

Technology Usage and the Physical Effects on Your Body

Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body, including a condition known as “text neck.” Extra strain on the muscles from sitting and reading various devices for long periods of time makes tissue sore and inflamed, and can potentially pull your spine out of alignment. Health experts call this damaging posture “forward head posture.”...
Read More
Kudos0

iOS Device Users Should Update to 9.2.1 Now!

iOS device users- update your software now! Apple released an update to iOS 9 this week, which fixes a three-year old cookie theft bug. Cookies are small files that contain various types of data that remember a user, and are placed on your computer or mobile device by websites you visit. This flaw can allow hackers to impersonate users and steal sensitive information by creating a malicious public Wi-Fi network. The hackers then wait for a compromised user to join the network and redirect them to a malicious website designed to steal user credentials. From there, the hacker would be able to...
Read More
Kudos1 Stats

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experienced a monetary loss of $1 or more. Half of all victims resolved the issue within a day, but nearly one-third (29 percent) had to spend a month or more getting their life back on track. While identity theft gets a lot of the press, there are other forms of fraud out there, both on the Internet and off. The good news is that there are a...
Read More
Kudos1 Stats

Cyber Security Top Tips for 2016

2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred. We took a look at what was trending to try to predict the next “big things” in cyber security to be on the lookout for in 2016. Ransomware: Ransomware is the big topic this year. The first noticeable case of ransomware popped up in 2013, and hackers have latched on to this tactic, refining it over the years. In 2015 we reported on six major ransomware campaigns, which ranged from Mac to Android. Since ranso...
Read More
Kudos0

Telltale Signs an App Is Violating Your Privacy

Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your personal information, including sensitive financial information that can then be used to steal your identity. A lot of malware ends up on your phone due to malicious apps. So what are signs that you might already have a malicious app on your phone?...
Read More
Kudos0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online.

Read More
Kudos4 Stats

Cyber Security Best Practices for Employees

Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the small things you can do can go a long way towards protecting your organization.

Since it is the beginning of the year, many people are returning to work and trying to get out of “vacation mode.” (Us too!) We’ve decided to outline some tips to help you throughout the year to stay safe online while protecting your company in the process.

Read More
Kudos3 Stats

What is The Deep Dark Web: #30SecTech

There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything else under the search engine sun. This is known as the “surface web.”

Read More
Kudos1 Stats

New Year, Renewed Readiness

With a new year comes renewed excitement, refreshed minds and revitalized focus for all that lies ahead. The same is unfortunately true for the cybercriminals we are up against.

Read More
Kudos0

Microsoft to End Support for IE versions 7, 8, 9 and 10, January 12th 2016

Microsoft will be discontinuing support for Internet Explorer versions 7, 8, 9 and 10. While these products may still remain functional on your computer, security fixes will no longer be available for them after January 12th, 2016. 

Read More
Kudos4 Stats

Connected Car Hacking- 2015 In Review

By now, you’ve likely seen press covering the wave of futuristic car models designed to operate entirely through automation. Commonly known as self-driving cars, these vehicles represent just one example of an increasing number of technologies predicted to gain connectivity to the Internet (from dishwashers to tractors)....
Read More
Kudos1 Stats

Social Engineering Scams on Social Media

Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction. By ‘engineering’ a believable scenario, criminals are able to manipulate users to act on otherwise risky behavior. There’s a dark art to this skill, and it’s one that can cause you and your online network a great deal of distress should you become compromised....
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Monitoring Your Financial Accounts

Norton has asked the North Pole’s #1 IT Elf to give you some tips for the Holidays. It might sound simple, but the best way to be safe during the Holidays is to monitor your accounts. Here Kirby gives some simple rules to keeping an eye on your accounts and what to do if you see some thing that shouldn’t be there. Kirby gives you simple steps to stay safe
Read More
Kudos0

How to Protect Your New Tech

The holiday season is the most wonderful time of the year, and a time when many receive new gadgets. If you’re the type that regularly receives smartwatches, wearable tech, and other gadgets as gifts, understanding how best to protect them is very important.

Read More
Kudos1 Stats

Norton Family Premier Receives PC Magazine Editor’s Choice Award

The Internet, social media and mobile technology make it harder than ever to keep your kids safe. Norton Family Premier, recent recipient of the PC Magazine Editor’s Choice Award is an invaluable tool to help you help your kids. Lead Security Analyst at PC Magazine, Neil Rubenking, cited the “impressive range of parental control and monitoring features for parents of today’s hyper-connected kids.”

Read More
Kudos5 Stats

Ransomware And The Importance Of Backing Up

Ransomware has a unique and specific agenda, and one that can be entirely avoided if properly understood.

Read More
Kudos2 Stats

The Future of the Connected Home: Security in the Internet of Things

4.9 billion connected things are expected to be in use in 2015, increasing to 25 billion by 2020. Many of these smart devices can be found in the connected home. Symantec researchers have found that smart home devices have basic security issues, such as weak authentication and common web vulnerabilities. These can be exploited by hackers posing a privacy and security risk....
Read More
Kudos0

13 Million MacKeeper User Accounts Exposed

Earlier this week, white hat hacker Chris Vickery announced that he was able to gain access to over 13 million MacKeeper user accounts. A vulnerability was exploited in the company’s servers, which exposed the usernames, email addresses and other personal information of 13 million customers.

Read More
Kudos1 Stats

Massive Ransomware Campaign Using TeslaCrypt Discovered

​It has been discovered that attack groups behind the ransomware known as TeslaCrypt (Trojan.Cryptolocker.N) have ramped up activity in the past two weeks, sending out massive volumes of spam emails containing the hidden malware.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Old School vs Digital Wallets

Now that payments are regularly being made from phones and watches, Kirby gives you a run down of why digital wallets are becoming more popular, how they work and some issues to consider.
Read More
Kudos3 Stats

A Cold Calling Scammer - a Personal Experience

I was sitting in my home office when my home phone line rang. It was late. 10:30pm to be exact, but I often use this quiet time, after my kids have gone to bed, to catch up on email.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags. 

Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos0

Types of Common Mobile Threats and What They Can Do to Your Phone

If you know anything about online security, you know that your phone is even more susceptible to malware than your computer. It gets worse. Once your phone is hacked, your computer can easily be next. That’s because your total online security is only as secure as the weakest link in the chain.

Read More
Kudos1 Stats

Mobile Security Smarts: How Hack-Proof are Your Mobile Habits?

With holiday gift-giving going mobile, are you eyeing a new device? More than half of holiday shoppers plan to purchase a tech accessory this season, with TVs, tablets, and smartphones topping many wishlists. While two-thirds of those shoppers plan to use a mobile device to help them make holiday purchases (according to ce.org). Do you have the right habits to keep a shiny new device secure? Put your mobile habits to the security test. Top takeaways for smarter mobile security. Be cautious of connecting to public wi-fi and mobile hotspots while you’re on the go. These networks are not...
Read More
Kudos1 Stats

Sneaky Android Adware Variant Tricks Users Into Thinking a Different App is Malware

A new, sneaky variant of Android.Mobilespy has been discovered. This malware steals information, and displays advertisements, however it executes it in a different way than most malware.

Read More
Kudos1 Stats

Up To 5 Million VTech User Accounts of Parents and Children May Have Been Compromised in Data Breach

This week, VTech, a global company that manufactures Internet connected learning products for young children announced that they have been involved in a massive data breach. The company’s learning devices, such as a smartwatch and smartphone, allow kids to take and send photos, send text and voice messages and download apps via VTech’s Learning Lodge.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Holiday Scams

Meet Kirby the IT Elf, and Santa's right hand technology man. As the Holidays quickly approach, so do a fresh crop of scams. In this episode, Kirby highlights the most popular scams this year, how to spot them and how to be safe.

Read More
Kudos2 Stats

What Are Malicious Websites and Drive by Downloads?

Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised by doing nothing more than visiting a website.

Read More
Kudos1 Stats

How to Keep Your Personal Information Safe on Social Media

Social media runs a significant portion of people’s social lives.  We use it to connect with far-flung friends and family, send quick messages to co-workers, and announce major (and minor) events in our lives.

Read More
Kudos2 Stats

Some Dell Computers Found Vulnerable to Man-in-the-middle Attacks Due to Root Certificate Vulnerability

It has been recently discovered that some Dell computers are vulnerable to man-in-the-middle attacks because of an issue with a root certification authority. 

Read More
Kudos1 Stats

Thanksgiving - Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.

Read More
Kudos2 Stats

Users Believe Using Public Wi-Fi Riskier than Using a Public Restroom

With the Internet threat landscape rapidly growing, online crime has become a fact of life. While we read about breaches and identity theft every day in our news outlets, we wanted to better understand Norton Cybersecurity Insights Report how you, the consumer, are impacted on a more human level. The Norton Cybersecurity Insights Report captures how consumers perceive and react to online transactions and threats prevalent on the Internet today.

Read More
Kudos1 Stats

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks in order to infect a web browser and device. Often, it’s very difficult to distinguish between legitimate and malicious online ads.

Read More
Kudos2 Stats

OS X Is Not Immune to Crypto Ransomware as Researchers Uncover Proof-Of-Concept

A proof-of-concept (PoC) discovery means that this is not an actual outbreak, but that it has been created in a lab by researchers simply to see prove if it is possible. The researchers that perform these tasks are considered white hat hackers. Some white hat hackers are usually paid employees or researchers working for companies as security specialists that attempt to find security vulnerabilities. The point of this type of research is to try to get one step ahead of the bad guys and to produce early detection and software patches for possible future outbreaks....
Read More
Kudos2 Stats

Why Smartphones and Tablets Need Security Software

You install Internet security software on your computer, but what about your smartphone or tablet? If you think the mobile devices don’t require security software, well, you’d be wrong. Treating your smartphone or tablet in the same manner you do your laptop is crucial, as these devices are actually just smaller, powerful computers....
Read More