• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced
Kudos1 Stats

How To Set Up and Secure Your New Tech

With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped many people’s lists of things to buy. As exciting as these gifts are to give, if you end up on the receiving end it’s easy to get caught up in the fun of your new gadget. However, you should be aware of the ways that you’ll need to protect your new device. Just remember—if it connects to the Internet, it is vulnerable. From laptops to smart watches, to connecting safely online, we have created the ultimate guide on how to protect your new tech. How to Securely Set Up a New Computer: 1. Ins...
Read More
Kudos0

Break In At The Daycare

After a long day at work, Joseph rattled the thick glass door of the daycare center. It didn’t budge. He pushed the keys into his jacket pocket and made sure his backpack was with him. He got into his car and left for home. At around midnight he got a call from the police that his daycare center was broken into. Someone had thrown a huge rock into the glass door and grabbed whatever they could and got away. A wave of panic and helplessness rose over him. “We have insurance, don’t we?” his wife asked him. “Of course, also I never leave any valuables in there. I have to replace the gla...
Read More
Kudos1 Stats

Happy Thanksgiving! Celebrating the Things That Keep us Safe

Happy Thanksgiving from Norton!

Read More
Kudos0

12 Days of Norton Tips

We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year.

Read More
Kudos0

Holiday Travelers' Tips for Device Security in Airports

As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport. 

Read More
Kudos0

What is Identity Theft?

Whenever someone uses your personal information to pretend to be you to commit fraud or to gain financial benefits, they are committing identity theft. Identity theft is a serious punishable crime. Every 2 seconds someone is becoming a victim of identity theft. The anonymity and location independence of this crime makes it hard for law enforcement to catch the perpetuator immediately. This leaves the victim spending up to 200 hours or six months to recover from identity theft. How does identity theft happen? Criminals operate with a wide range of tools to gain access to your personal in...
Read More
Kudos0

The Real Cost of Identity Theft

It has been the FTC’s number one complaint. The IRS has taken proactive measures to prevent and detect it, yet according to the US Department of Justice, identity theft has spared few and has victimized 17.6 million people in the US. It is troubling to know that despite all the precautions one can take to prevent identity theft, criminals find newer and more innovative ways to exploit your identity.  To avoid being a victim of identity theft, here is what you need to know. The most obvious outcome of identity theft is the financial loss a victim endures. However there are many hidden ...
Read More
Kudos2 Stats

Don't Let The Grinch Steal Your Identity

The holiday season is a time of merriment for one and all. That includes scammers,fraudsters, and thieves too. It’s the best time of the year for them to do their worst. More people will be shopping, partying, traveling, and generally letting their guard down. This gives these criminals an avenue to unleash the Grinch in them. As the years roll by, holiday-related crimes have evolved. Petty thieves who were once satisfied with pickpocketing or stealing a carelessly placed shopping bag have grown into more complex identity thieves. The few dollars in your wallet have little or no value ...
Read More
Kudos0

What To Do If You Are A Victim of Identity Theft

If your identity has been stolen then you are not alone. Every two seconds there is a new victim of identity theft. With 500 million people having their information compromised in recent data breaches, it’s very likely they could become victims of identity theft. There are a few red flags that go off when a person becomes a victim of identity theft. Do not ignore these signs. Instead, take measures to rectify the loss. Damage control is time consuming and tedious but it may just save your lifetime savings. Here are a few things you can do if you become a victim of identity theft. 1. C...
Read More
Kudos0

Happy Halloween From Norton by Symantec!

Read More
Kudos0

Debunking the Myths of Identity Theft

There is a wealth of information on identity theft and prevention, yet this area of crime is developing rapidly and is shrouded in myths. Here are 9 truths to expose the reality of identity theft: Myth #1 – If I am careful, I will not fall victim to identity theft. Truth – Criminals are getting more sophisticated at stealing your identity The mode of operation for stealing someone’s identity is fast evolving. Just being careful is not enough. You need defense. Criminals have a lot to gain with very little effort when executing this crime. Criminal organizations spend plenty of time...
Read More
Kudos1 Stats

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things. However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices. What Is a Smart Home? A smart home is simply a home that’s connected to the Internet. Why would you want to connect your...
Read More
Kudos1 Stats

How To Recognize and Protect Yourself from Cybercrime

Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more concerns than just basic financial ones. When you see the full list of cybercrimes out there, you might be tempted to stop using the Internet entirely. However, such drastic measures are not necessary. All you need to do to protect yourself is take some basic precautions and know who to contact when you see others engaged in criminal activities online. ​What Is Cybercrime? Cybercrime is any ...
Read More
Kudos0

Safe Online Shopping Tips for The Holiday Season

The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic. While online shopping has made our lives easier, it also exposes new weaknesses with the information we use to make those very purchases. The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. In fact, Norton Safe Web found that shopping sites are amongst the top ten most frequently exploited websites. An additional concern is bogus e-commerce websites, which are made to look le...
Read More
Kudos0

From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace

Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all of these need to take an interest in cybersecurity or pay the price. It’s a matter or success, but also a matter of national security. Those working in critical infrastructure have a special obligation to make sure that they’re securing the workplace. Here are some of the best ways to create a culture of cybersecurity where you work. It All Starts With Education and Training Cybersecuri...
Read More
Kudos1 Stats

Online Harassment: Halting a Disturbing 'New Normal'

A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it. ​ On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne hardly seems a likely candidate for cyberbullying. The former Parramatta Eels, San Francisco 49ers and Fiji rugby sevens superstar holds an elite place in Australian rugby league history, having been awarded the Dally M Medal twice as the NRL's player of the year. He has represented Australia and Fiji and in 2009 was also named the Rugby League International Federation’s International Pla...
Read More
Kudos1 Stats

The Basic Steps to Online Safety and Security- NCSAM Week 1

Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age, that is not the case. The threat landscape has evolved just as our technology has. The more devices that are out there equal more things for cybercriminals to attack. Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as installing antivirus on a computer anymore. A good foundation to personal cybersecurity is knowledge. Since threats don’t come solely in digital f...
Read More
Kudos0

Can the Elections Get Hacked?

The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can we possibly know? A Symantec security expert recently demonstrated just what a motivated hacker can do to undermine the election by hacking an electronic voting machine.  Can Hackers Hack the Election? At the Black Hat convention this year, Symantec’s Brian Varner demonstrated a security flaw in an electronic voting machine and the smart card a voter would use to place their vote. Using...
Read More
Kudos0

How a VPN Can Help Hide Your Search History

Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds. But did you ever stop to wonder what happens to your searches?

Read More
Kudos1 Stats

Can a mobile phone battery track you?

With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to track people online. In some instances, this can be used to upsell services purchased through a mobile app, ride sharing “surge pricing” for example. How else can this be used? Here’s what you need to know about the privacy and security issues raised. What is the Battery Status API The Battery Status API was introduced in HTML5, and this was intended to give site owners information so th...
Read More
Kudos1 Stats

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.   Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablet...
Read More
Kudos1 Stats

Stop Stressing: 10 Internet Safety Rules To Help Keep Your Family Safe Online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the Internet also has the potential to harm us, and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real. And though there are real reasons to protect your kids and your data from cyber thieves, you shouldn’t need to shy away from the advantages the Internet has to offer your f...
Read More
Kudos2 Stats

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls. 

Read More
Kudos0

Pop-Cultural Relevance of Hacking in Today's World

When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime wasn’t quite the household name it is today, therefore, there was a wide unfamiliarity of it within the public eye. Directors and writers have struggled with how to portray hacking in film simply because the act of hacking in real life is not very interesting or visually compelling. It’s just lines of code scrolling down a computer screen. In order to keep the viewer entertained they used chee...
Read More
Kudos1 Stats

How To Talk to Your Kids About Cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard. According to a 2015 survey 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online. This onslaught of hateful messag...
Read More
Kudos1 Stats

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas. While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Read More
Kudos4 Stats

5 Red Flags of Identity Theft

An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year. There is a big demand for stolen identities in the underground economy. Criminal outfits specializing in identity theft will go to any lengths to get their hands on your information. So what do these thieves do with your information? Your personal information in the hands of these criminals means you are putting your finances and your reputation at risk. It takes less than 30 seconds for a criminal to drain your bank account. They can...
Read More
Kudos3 Stats

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it. Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people a...
Read More
Kudos2 Stats

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees. This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Read More
Kudos2 Stats

Protecting Your Child From Identity Theft

Identity theft is a growing menace. With each passing day, cyber criminals are getting greedier and more malicious. They don’t spare anyone when it comes to reaping unethical financial gains.They wont stop at anything and that includes conning innocent little children. Why children? A child’s identity is a hot commodity in the underground economy. Usually a child has no credit history. That’s a clean slate for criminals to restart what they once squandered. Since children wouldn’t be using their Social Security number until much later in their lives, the crime goes unnoticed for years ...
Read More
Kudos3 Stats

How to Securely Set Up Your Home Wi-Fi Router

Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you could be letting anyone with a wireless-enabled device gain access to your home network. That means you’re opening up your emails, banking information, and maybe even details of your smart home’s daily schedule to criminals.  Basic Wireless Security Every router should have a password to keep out the bad guys. Some routers come with default passwords, but you should change these during setup. C...
Read More
Kudos2 Stats

What Is a No-Log VPN Network?

Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider.

Read More
Kudos1 Stats

Pokémon Go Real World Risks and Safety Tips

The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game for getting their children off of the couch and out getting some actual exercise. So far, my favorite headline about the game has been “Sore Legs Become Pandemic As Pokémon Go Players Accidentally Get Exercise.”  However, I’ve also stumbled upon some other news headlines that are quite worrisome, that affect people’s virtual and physical privacy. As a result, instead of writing a typical artic...
Read More
Kudos2 Stats

Pokémon Go Parents Guide for Children

One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play along with your children! First things first, with all apps your children are interested in, download the app and play it yourself to become familiar with what your children will be doing.  This way, you can become more informed about the gameplay, and you can talk to your child about how to be safe while using it. This is part two of a three part series where we are going to delve into examini...
Read More
Kudos2 Stats

Pokémon Go Cyber Security and Privacy Guidelines

In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my passion for cyber security. Admittedly, I became addicted immediately, which lead me to research how the game works, how to play it, and what the possible security risks are that come along with the game. Firstly, it is important to note that this game is not your average smartphone game. It uses a technology known as augmented reality, which is a blend of real life and technology. There are m...
Read More
Kudos0

How Facial Recognition Software Works

If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software in action. Here’s what you need to know about this emerging technology. How Facial Recognition Software Works You’ve never given much thought to how you recognize a face, and probably even less to how a computer would do it. Still, it’s not news that human faces have certain qualities you recognize. The spacing of eyes on a face, the position and width of a nose, the shape of a hairline and ...
Read More
Kudos2 Stats

Watch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That Took Down a Nuclear Power Plant

Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the years. However, brief news reports don’t even begin to uncover the darkness of this threat. In “Zero Days,” director Alex Gibney takes a deeper look at the sophisticated piece of weapons-grade malware that destroyed a part of an Iranian nuclear facility, as well as help facilitate espionage by spying on its target. This thrilling documentary discusses the complexity of the virus with Sy...
Read More
Kudos3 Stats

What Can Someone Do With a Stolen Identity?

Identity theft is the worst kind of theft there is. You don’t just lose your finances, you lose yourself. There is someone out there taking over your life one step at a time and ruining it for you. There are a whole lot of things criminals can do to compromise your identity. They have a lot to gain from stealing your identity because there is a huge clientele for stolen identities on the Dark Web. Here are a few things cybercriminals can do when your identity is stolen. 1. Buy Once your identity is compromised there is no stopping criminals from going on a shopping spree using your cred...
Read More
Kudos1 Stats

How Safe Is Surfing on 4G vs. Wi-Fi?

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way? Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them. How Do Mobile Devices Connect to the Internet? Let’s break down the three different ways your mobile device can connect to the Internet, and...
Read More
Kudos1 Stats

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps? How Mobile Payment Apps Work You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Read More
Kudos1 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos0

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack. If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Read More
Kudos1 Stats

The Day I Thought Cybercriminals Left Me For Dead

Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for a moment out of shock, and assured her I was very much alive and well. She went on to explain how she’d never seen anything like it before. As the initial shock wore off, we started to have a bit of a laugh on how bizarre this was. 

Read More
Kudos2 Stats

How to Avoid Public Wi-Fi Woes on a Business Trip

As summer arrives, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world, often using unsafe public Wi-Fi.

Read More
Kudos2 Stats

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...
Read More
Kudos5 Stats

Why Hackers Love Public WiFi

A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Online Crime Takes Many Forms The Norton Cybersecurity Insights Report announced that 594 million people around the world were victims of cybercrime in 2015, with 21% of Americans getting their email hacked and 12% having their financial data stolen after shopping online. With public Wi-Fi available everywhere, what seems like a conveni...
Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos1 Stats

Don’t Let Social Network Sharing Ruin Your Celebrations

Celebrating life’s milestone events is something we cherish. Births, weddings, and anniversaries. Even a death, although sad, can be a reason to celebrate the life of a loved one. And in most cases, as we share news of these milestones with friends, family, or our larger social networks, we never stop to consider that positive information could be used in a negative way. But it could.

Read More
Kudos4 Stats

Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security

Vacation may be a time for rest and relaxation, but your mobile devices likely won’t be getting a break. Now that smartphones and tablets are part of our daily lives, we spend more time than ever staying connected, even while on vacation. Just think of all the selfies you’ll be taking and updates you’ll be posting to your social networks! But, while sharing your vacation moments will be a fun way to capture your R&R, your fun vacation could turn into a bad situation if you choose to use your mobile devices on free public Wi-Fi during your trip. Learn how to be aware of using your mobile devices on public Wi-Fi at key points on your vacation.

Read More
Kudos3 Stats

What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi

If you’ve ever wondered if it’s safe to use public Wi-Fi, you are not alone. In fact, according to the Norton Cybersecurity Insights Report, 6 in 10 consumers believe using public Wi-Fi is riskier than using a public restroom. And it is. Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk. That’s why a virtual private network, better known as a VPN, is a must for anyone worried about online security and privacy. 

Read More