An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.
Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.
The cybersecurity landscape is constantly evolving with new threats and never-before-seen vulnerabilities being discovered by security experts and, just as likely, exploited by cybercriminals at a fast pace. Breaking news alerts of widespread data breaches or high-profile hacks serve as reminders of the need for security online, but the flood of information can also be overwhelming. Let this cut through the clutter - Here are 10 facts you need to know about today's cybersecurity landscape:
1: Cybercriminals are using more zero-day vulnerabilities than ever before.
A new zero-day vuln...
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.
If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year."
Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.