• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

The 12 Days of Norton

"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year."

Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.

Read More
Kudos2 Stats

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls. 

Read More
Kudos1 Stats

How Safe Is Surfing on 4G vs. Wi-Fi?

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way? Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them. How Do Mobile Devices Connect to the Internet? Let’s break down the three different ways your mobile device can connect to the Internet, and...
Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos3 Stats

The Risks of Public Wi-Fi

Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte? What Is Public Wi-Fi? Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots”...
Read More
Kudos2 Stats

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.

Read More
Kudos2 Stats

How to Let Go of Old Tech Securely and Responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online. To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
Read More
Kudos0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them. Meet the Cookie A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Read More
Kudos2 Stats

Good Cyber Hygiene

Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices. Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine. But what does that have to do with your computer? Cyber h...
Read More
Kudos0

Software Terms of Service and Privacy Policies Explained

If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information. They know most people don’t read the Terms of Service, so their Terms of Service include language authorizing a massive invasion of your privacy. At the same time, you might have noticed that most Terms of Service is just boilerplate. How do you read the Terms of Service and find out what you need to know about privacy without...
Read More
Kudos1 Stats

National Clean Out Your Computer day-The Importance of Clean Computing

February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.”  For centuries, this saying applied to tasks like scrubbing the floors and dusting the bookcases. Today, however, it applies to your computer just as much as it does to your house. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs. Why Clean? Cleaning both your computer’s hardware and its software matters.  Clean hardware help...
Read More
Kudos1 Stats

What Personal Information Should You Safeguard?

Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you. Let’s review this information to help you protect yourself as much as possible: Low Sensitivity Among the information considered “low risk” in regard to personal information sensitivity is your full name, address, and phone number. Medium Sensitivity Information regarded as “medium” in terms of sensitivity includes your date of birth, place of bi...
Read More
Kudos5 Stats

Ransomware And The Importance Of Backing Up

Ransomware has a unique and specific agenda, and one that can be entirely avoided if properly understood.

Read More
Kudos2 Stats

Thanksgiving - Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.

Read More
Kudos1 Stats

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks in order to infect a web browser and device. Often, it’s very difficult to distinguish between legitimate and malicious online ads.

Read More
Kudos1 Stats

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and stored in the cloud, or servers with an ongoing connection to the Web.

Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos3 Stats

Top 10 Small Business Resolutions & Strategies To Achieve Them

With the New Year ahead, and cyber threats continuing to loom over businesses, 2015 will likely bring more sophisticated and complex attacks. Security analysts called 2013 “The Year of The Mega Breach.” According to Symantec’s 2014 Internet Security Threat Report, businesses saw a 91 percent increase in targeted attacks and a 62 percent increase in the number of breaches. Additionally, the recent string of credit card breaches targeting major retailers also provide further reminder that cybercrime remains prevalent and that cyber threats show no sign of slowing down. The exploitable vuln...
Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos1 Stats

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.

Read More
Kudos1 Stats

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1 Stats

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos1 Stats

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More