• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

What Is A Man In The Middle Attack?

In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Read More
Kudos4 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Read More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.. But have you ever thought that way about what is on your tablets, computers and mobile phones? Right now, most folks have hundreds of phot...
Read More
Kudos6 Stats

What Is a Virus #30SecTech

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that...
Read More
Kudos2 Stats

Spring Cleaning to Secure Your Digital Life

Tidy Up Your Digital Life It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started: Cleanup your PC workspace: Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized.   Get organized: Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folde...
Read More
Kudos3 Stats

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information. Exploit Kit Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through tha...
Read More
Kudos3 Stats

What is Social Engineering?

We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack. Types of Social Engineering Attacks Social engineering is a way that cybercriminals use human-to-human interaction in order get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that at...
Read More
Kudos1 Stats

Spring Break and Mobile Device Safety

Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; ...
Read More
Kudos3 Stats

Public Wi-Fi Security 101: What Makes Public Wi-Fi Vulnerable To Attack And How To Stay Safe

Nowadays, free public Wi-Fi is widely and readily available in larger cities—airports, restaurants, coffee shops, libraries, public transport, hotel rooms, you name it. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. However, the security risks should not be forgotten. While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be awar...
Read More
Kudos2 Stats

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. Whi...
Read More
Kudos0

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. While...
Read More
Kudos3 Stats

How do Zero-Day Vulnerabilities work: #30SecTech

What is a software vulnerability? In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that can be exploited by cybercriminals. Why do vulnerabilities pose security risks? Hackers write code to target a specific security weakness and package it into exploit malware, a type malicious software that takes advantage of a vulnerability in o...
Read More
Kudos2 Stats

Norton Mobile Security Receives AV-TEST Innovation Award

Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape. As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
Read More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy. What is ridesharing? Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button.  In a...
Read More