• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, there’s malware on your computer anyway. The fight against malware is a complicated arms race of sorts. Here’s how it works. The Four Components of the Malware Arms Race There are three main players in the malware arms race: Malware Coders: The malware coders are, unfortunately, generally the winners of the arms race. They write mali...
Read More
Kudos2 Stats

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority. 

Read More
Kudos0

How Can I Tell If I Have Malware and What Can I Do About It?

Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors encountered on a computer. However, all of them share a common goal, which is to compromise the safety of your devices. Symptoms of malware may appear obvious or discrete; knowing how to detect these dangerous intrusions will help you determine how to go about fixing the problem should it ever occur.   Malware is short for malicious software and refers to pro...
Read More
Kudos1 Stats

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas. While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Read More
Kudos3 Stats

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees. This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Read More
Kudos2 Stats

How to Let Go of Old Tech Securely and Responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online. To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More