• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos3 Stats

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees. This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Read More
Kudos0

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack. If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Read More
Kudos0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them. Meet the Cookie A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Read More
Kudos1 Stats

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and stored in the cloud, or servers with an ongoing connection to the Web.

Read More