Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the Internet also has the potential to harm us, and the people we love. Too often we read about another company falling victim to a cyber attack, or a friend’s email or social network account being hacked. These dangers are real.
And though there are real reasons to protect your kids and your data from cyber thieves, you shouldn’t need to shy away from the advantages the Internet has to offer your f...
With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.
Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.
With a new year comes renewed excitement, refreshed minds and revitalized focus for all that lies ahead. The same is unfortunately true for the cybercriminals we are up against.
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on.
For a long time Mac users enjoyed a period of peace—they felt impervious to threats, only to realize years later that the sophisticated hacker would eventually evolve to this platform...
You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats.
Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same pers...
It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat.
After what seems like an eternity, you come to the crushing realization that you have lost one of the most valuable material possessions...
Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the
There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything else under the search engine sun. This is known as the “surface web.”
Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experienced a monetary loss of $1 or more. Half of all victims resolved the issue within a day, but nearly one-third (29 percent) had to spend a month or more getting their life back on track. While identity theft gets a lot of the press, there are other forms of fraud out there, both on the Internet and off. The good news is that there are a my...
Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your personal information, including sensitive financial information that can then be used to steal your identity. A lot of malware ends up on your phone due to malicious apps. So what are signs that you might already have a malicious app on your phone?
Slow Internet Connections
A slow Internet connection doesn’t always mean malware, but it...
A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS.
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.
As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job.
The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. One can’t assume your phone and the information it stores is safe from the malicious intentions of the human mind.
Data Privacy Day (DPD), is an international effort held annually on January 28 in order to hel...
Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body, including a condition known as “text neck.” Extra strain on the muscles from sitting and reading various devices for long periods of time makes tissue sore and inflamed, and can potentially pull your spine out of alignment. Health experts call this damaging posture “forward head posture.”
“Neck muscles, in their proper position, are designed to support the weight of your head, about 10 to ...
Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online.
Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them.
Meet the Cookie
A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You may never see your phone again, but you’ll know that your personal information is safe from those who would abuse it.
Let the Right People Know
The first thing to do is to let the authorities know your mobile device was stolen. File a report with the police—not only is this helpful for insurance purposes but it also increases recovery ch...
Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore yourself, at risk.
What Third-Party App Stores Do
Dangerous third-party app stores work via malicious advertising or even code. The ads or codes are “injected” into popular apps users purchase through these stores instead of legitimate options. While not all third-party apps are “bad,” many stores bait users by offering popular apps for much cheaper prices, and subsequently put user privacy ver...
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that 90 percent of Android devices are exposed to at least one critical vulnerability.
The threat model was constructed using three common attack vectors: installation attack (malicious codes installed through app download); dynamic code loading (an existing app downloads new malicious codes); and injection (an attacker injects malicious code...
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Fraudulent emails are crafted to appear legitimate, such as messages from your bank or another trusted source. They request personal information, which criminals then use for identity theft.
So what should you do if you find yourself a victim of an e...
Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get paid to complete surveys, and earn rewards or special discounts from popular brands. Some surveys aren’t paid at all, offering consumers little more than the opportunity to participate in the development process of a product or service.
There’s been a lot of hype about people allegedly making a living off of these online surveys, causing...
The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions. A botnet is nothing more than a string of connected computers coordinated together to perform a task. That can be maintaining a chatroom, or it can be taking control of your computer. Botnets are just one of the many perils out there on the Internet. Here’s how they work and how you can protect yourself.
Botnets are the workhorses of the Int...
Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.
With the advent of easy digital photography, however, connecting extra information to the photos became easy as well. This information, known as “metadata,” might include items like the GPS coordinates of the photo’s location, the date and time it was taken, the camera type and shutter settings, and the software used to edit the photo.
Many digital photographers don’t realize that their photos might carry this...
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information. They know most people don’t read the Terms of Service, so their Terms of Service include language authorizing a massive invasion of your privacy. At the same time, you might have noticed that most Terms of Service is just boilerplate. How do you read the Terms of Service and find out what you need to know about privacy without...
While Valentine’s Day is for lovers, we bet you didn’t know that there is a holiday for the single folks as well! Singles Awareness Day was created as an alternative to Valentine’s Day, and whether you’re celebrating or commiserating your single status, we’re pretty sure that many of you have crossed paths with an online dating site at some point. Nowadays, online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. 70% of compromised users are wome...
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared device, such as a tablet or smartphone, or just to keep prying eyes away from the device.
In our busy lives, sometimes we don't give much thought when a close friend asks to look at something on our phone, or your rambunctious child snatches up your tablet to get their Angry Birds fix. But the things we have on our devices contain much more information about ourselves than we realize. Norton App Lo...
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you. Let’s review this information to help you protect yourself as much as possible:
Among the information considered “low risk” in regard to personal information sensitivity is your full name, address, and phone number.
Information regarded as “medium” in terms of sensitivity includes your date of birth, place of bi...
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe.
How Do Biometrics Work?
If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet.
Don’t cancel your travel plans just yet. Here are eight cyber security tips for business travelers that are also great tips for anyone planning a holiday abroad:
1. Lock Devices Down
Most smartphones, laptops, and tablets come equipped with security settin...
Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a computer’s hard drive. But what really happens to all that data? Where does it go, and is it really gone forever?
Some people will be relieved to know that, most of the time, deleted files are not permanently gone. Many of us have at one time or another accidently deleted items we did not mean to; in this case the prospect of bringing those files back from the dead is usually good news.
The bad news...
You could call mobile devices the new frontier for malware. Malware often appears on mobile devices in the form of an app. These apps sometimes include malicious code that makes the app do things it’s not supposed to do – such as broadcast your location information while you’re searching local maps.
Of all the mobile providers and systems, Android appears to be the most vulnerable to invasion by malware because of the openness of its platform. The flexibility that makes for so many awesome apps has the slight downside of leaving open some security vulnerabilities. But fear not! You can pr...
February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.” For centuries, this saying applied to tasks like scrubbing the floors and dusting the bookcases. Today, however, it applies to your computer just as much as it does to your house.
When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.
Cleaning both your computer’s hardware and its software matters.
Clean hardware help...
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it’s up to users to identify signals early on and avoid unsolicited content.
Here’s a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.
Spam on Social Media
A lot of the time, spam on social media is just bad social med...
A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home page or search page with the hijacker page. The idea is to make users visit certain websites whether they want to or not so the hijacker enjoys higher advertising revenue. Browser hijackers may also contain spyware to obtain banking information and other sensitive data.
As frustrating as browser hijackers can be, they luckily aren’t terribly...
No one said parenting is easy. Especially when your children are doing things in the cyber world that you as a child never imagined. With the wealth of information and non-traditional methods of making friends and hanging out, our children are no doubt having a good time, thanks to the advancements in technology. But that still doesn’t mean they have the liberty to do as they please at the expense of others.
One of the most important aspects of parenting is setting a good example. Your kids will closely watch your online manners and etiquette. You need to be aware and educated about net...
An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a screeching halt in the event that your personally data is compromised while traveling.
Vacations can often put your personal information at risk, due to careless missteps in how you go about preparing to leave, how you communicate while on vacation, and what you share on social media.
Here are seven ways to ensure your data stays safe wh...
Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of phony travel booking websites is growing because they’re so successful at scamming consumers. Learn what to do so you don’t take a quick trip to Fraudville instead of your dream destination.
A major new survey titled reveals that 76 percent of Australian women under the age of 30 have experienced online harassment. This International Women’s Day, let’s make the online world a safer one.
In 2015, Prime Minister Malcolm Turnbull invested $100 million in a Women’s Safety Package. At the launch of the package, Michaelia Cash, Minister for Women and Employment, said ‘all women in Australia and their children should be safe at home, should be safe on the streets and should be safe online’.
As a senior leader at an online security company and mother of a teenage girl, I have a uniq...
There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, and your personal property at risk.
There’s no reason to assume the worst when you go on vacation, but you can greatly reduce your chances of a security breach by preparing your smartphone or tablet ahead of time and remaining vigilant while on your trip. Here’s how to prepare a smartphone or tablet before you go on vacation.
Freezing your credit report is sometimes very necessary. It prevents credit thieves from opening new cards and other accounts in your name, and is often recommended when you’re dealing with the ramifications of identity theft.
What Is a Credit Freeze?
A credit freeze, also known as a security freeze, gives you the chance to “lock” your data at major credit bureaus. Doing this also makes it impossible for identity thieves to use your name on anything linked to your credit report. You will receive a password or personal identification number to use for temporarily lifting or removing the f...
Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over a computer.
One of the typical “good” bot uses is to gather information. Bots in such guises are called web crawlers. Another “good” use is automatic interaction with instant messaging, instant relay chat, or assorted other web interfaces. Dynamic interaction with websites is yet another way bots are used for positive purposes.
Online socializing has both good and bad sides to it. While it has opened a whole new dimension of ways to communicate and has added convenience to our lifestyles, it unfortunately has some unpleasant effects too.
Believe it or not, accessing the deep web is easier than you think. In fact, you’ve probably already done it. The media hasn’t done a great job of differentiating what’s considered deep web, and what is actually dark web—two similar titles for two very different things.
What Is the Deep Web?
The deep web is just what it sounds like: below the surface and not completely dark.
Search engines like Google, Yahoo, and Bing are able to search and index websites because of links; they use links to rank search results according to things like relevancy, inbound links, and keywords. But that’s w...
Today we are proud to announce the launch of the second installment in our documentary series "The Most Dangerous Town on the Internet."
In episode one, we visited the town Râmnicu Vâlcea, which is better known as "Hackerville." In the first film, we met hackers from all walks of life, including white, grey and black hat hackers, and talked to them about their motivations behind what they do.
In the second installment, we travel all corners of the globe to find out where cybercrime goes to hide, by exploring what is called Bulletproof Hosting. While the hacker is the operator of the att...
You’ve heard of malware, ransomware, botnets, and the like. What you don’t hear about is the technology behind these threats. These threats all have to come from somewhere, they’re not just out there floating around on the internet- they have to be stored someplace. Since a majority of these threats are illegal in a lot of countries, this is where bulletproof hosting helps facilitate these threats.
To clearly understand what bulletproof hosting is, we should first take a step back and talk about regular hosting. A regular web hosting service is a company that operates a facility, usually ...