• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas. While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Read More
Kudos3 Stats

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees. This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos4 Stats

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.

Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos1 Stats

A New Look into Cybercrime- “In Search Of The Most Dangerous Town On The Internet”

Cybercrime is on the rise, and although it may seem like it is faceless crime, it is not. “In Search Of The Most Dangerous Town On The Internet” takes a deep, personal look into the real world of cybercrime. The Romanian town Râmnicu Vâlcea, also known as, "Hackerville", is home to many notorious scammers and convicted blackhat hackers, such as Guccifer, who was responsible for the Hillary Clinton email hack. Through their own words, they discuss their methods for deploying malicious worms, viruses, social engineering scams, stealing identities, and the surprising...
Read More
Kudos5 Stats

What is the Difference Between Black, White and Grey Hat Hackers?

Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission.  Many companies and government agencies actually employ hackers to help them secure their systems. Hackers ar...
Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot...
Read More