Today marks the 15th annual System Administrator Appreciation day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day, read on for a few of the top reasons to say thanks.
Scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts spreading spam, offensive content, and malvertisments for profit. Read on for details on what to look out for and tips to protect yourself from social media scams.
Is there such a thing as a miracle diet pill? Symantec's Satnam Narang points out the latest online diet scams that are infiltrating sites like Pinterest, and gives you key tips on how to protect your social media accounts.
Spammers like to take advantage of a business's social media following by posting or tweeting ad spam. How to deal with it? We offer some security-savvy tips to help keep these pesky scams from taking over your business's social walls and feeds.
Symantec security experts have uncovered a cyber-espionage campaign targeting Western energy companies. The group, which Symantec calls "Dragonfly", targeted 1,018 unique organizations over 84 countries using spear phishing and watering hole tactics to install malware onto victoms' computer systems.
As a small business, promoting trust among customers online is vital in today's economy, but how can you do that? Norton offers some important tips and a couple of unique offerings to help bolster your site's security and online reputation.
While the World Cup Security Center's Wi-Fi password was revealed on Twitter, the incident serves as a reminder that proactive security habits are key to protecting your information from hacking or data theft. Read on for tips to better Wi-Fi security that you can follow now.
You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. Learn more about securing your small business.
You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Check out these quick steps you can take to make social networking and mobile habits safer for children.
We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. See how the #BoldlyGoContest works.
Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up.
We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly.
Gooooaaaaaaaaalll! Bonding with Dad over the World Cup on a new Smart TV can be a great way to celebrate this Father's Day, but, with every Internet-connected device comes new vulnerabilities that can put your privacy and personal data at risk. Find out how to have a safer viewing experience so that you (and Dad) can keep your eyes on the ball.
We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Norton experts have identified the top ten of website categories that are most vulnerable.
Consumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected
On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware. Blackshades is a “silent, but deadly” threat, which unfortunately means, if you are infected, you likely won’t know it until it’s too late. Norton products have long been able to detect and block Blackshades from attacking your computer. Read on to learn more about this threat and how to protect yourself and your computers.
Have you ever stopped to consider what dangers may be lurking within that free app? Many apps have been developed by unscrupulous minds intent on a range of activities that could put you at risk - from stealing your identity to capturing your bank account details. A lttle extra caution can go a long way to help you stay protected. Here are some top tips from our Norton mobile security expert, Con Mallon.
Technology can greatly improve our lives when it’s simple, but it can cause headaches when it’s not. Thankfully, there are plenty of software utilities out there that can automate the annoying legwork for you, and prevent unexpected issues from arising. Here, we look at three of the most useful.
bySollyD05-16-201409:00 AM - edited 05-15-201403:51 PM
Wait...is Antivirus dead? Are we doomed to fall prey to sophisticated cyber criminals? Is there a bogeyman in my closet?
Relax! Cyber attacks have advanced with the times, but so has Norton by Symantec's security. Find out how we keep your information safe, beyond the realm of traditional AV, and how Norton will have you covered into the future.
According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. Learn more about technology trends, cybersecurity and how-to protect your business.
Fake offers and social media scams aimed to dupe users to steal sensitive information, money and more ran rampant last year. Eighty-one percent of all scams lured people in with a fake offer. Norton examines the tactics these cyber criminals use to lure unsuspecting users so that you and your family can be more savvy in spotting a "fake."
Satnam Narang, Symantec Security Response expert, takes a broader look at the Heartbleed bug, and breaks down what you what you really need to know to feel protected in a rapidly changing cyber landscape.
With so many great devices to choose from, it's hard to know where to start. Even the decision between Andorid or iOS can be a difficult conundrum. Expert advice on mobile security gives you the tools to understand the pros and cons of the two leading mobile operating systems.