• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

System Admin Day 2014! Reasons to Thank Your System Administrator Today (and Everyday).

Today marks the 15th annual System Administrator Appreciation Day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day here are a few of the top reasons to say thanks. Thank your SysAdmin on System Adminstrator Appreciation Day! When your server goes down at midnight on a Saturday, a sysadmin IT pro has everything up and running by 9a.m. on Monday. That lovely interwebz connection you are accessing to view this very blog from your office network – all thanks to a sysadmin’s handiw...
Read More
Kudos0

Prevent Scammers From Taking Over Your Company's Social Presence

Social media is a hugely important tool for growing your business’s brand, and the last thing you want to do is expose your customers to spam. Yet we’ve all seen it: the tweet promising thousands of new followers or the Facebook post teasing a way to lose weight or earn easy money – of course only if you’ll click on a link. It’s an issue that’s not going away any time soon, and it must be handled in the right way. The last thing we want to do is make our social media pages less open to the public, so instead we must use the settings available to us to keep spam away, and actively deal wit...
Read More
Kudos1 Stats

Security Experts 'Pin' So-Called Miracle Diets As Social Scams

Obesity is a known topic of conversation in the United States, with one in three U.S. adults being categorized as overweight. Most of us have come across posts claiming to promote a new weight loss "miracle" in our online experiences. Healthcare experts are constantly reporting that there is "no such thing" as a miracle diet, but, much like a fabled lake monster, or a giant hairy beast in the woods, legends die hard.  Scammers are always trying to find new ways to lure in vulnerable dieters who still want to believe that an easy solution exists. They use social media as a vehicle to peddle...
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click. While it is unfortunate that scammers would look to capitalize on this tragic incident, this is a common t...
Read More
Kudos0

Mobile Fitness Trackers May Be One Step Away From Hacks

Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.    It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of ou...
Read More
Kudos1 Stats

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device. Earlier this year, Symantec’s Internet Security Threat Report noted that mobile malware in 2013 was developed almost exclusively for the Android OS, 32% of which steals a user’s personal information. Luckily, Google says that no e...
Read More