We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year.
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.
How Do Mobile Devices Connect to the Internet?
Let’s break down the three different ways your mobile device can connect to the Internet, and...
A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people a...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Vacation may be a time for rest and relaxation, but your mobile devices likely won’t be getting a break. Now that smartphones and tablets are part of our daily lives, we spend more time than ever staying connected, even while on vacation. Just think of all the selfies you’ll be taking and updates you’ll be posting to your social networks! But, while sharing your vacation moments will be a fun way to capture your R&R, your fun vacation could turn into a bad situation if you choose to use your mobile devices on free public Wi-Fi during your trip. Learn how to be aware of using your mobile devices on public Wi-Fi at key points on your vacation.
Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe.
How Do Biometrics Work?
If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your personal information, including sensitive financial information that can then be used to steal your identity. A lot of malware ends up on your phone due to malicious apps. So what are signs that you might already have a malicious app on your phone?
Slow Internet Connections
A slow Internet connection doesn’t always mean malware, but it...
It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, such as the iCloud photo breach, an iCloud password vulnerability, and the more recent keyraider malware, Apple took notice and significantly upped their security game.
Private Means Private!
iOS 9 will not tie any usage data to an Apple ID or any other Apple service. The data is now completely anonymized, and Apple states that they w...
Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; ...
Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape.
As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists.
And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season.
Protect your holiday hand-me-downs
To many consumers handing down or selling their device may seem like a har...
If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your digital and personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software.
If your goal is to protect your devices and your identity, you can’t afford to take chances. There are two things you can do to avoid purchasing fraudulent security and antivirus software. First, do your research, educate yourself, and be cautious. Second, purchas...