As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are also entitled to receive free support at http://support.norton.com.
If you’re using Windows 7 or 8, you may have already reserved an upgrade to Windows 10 before its July 29th release. After doing so, Microsoft’s app compatibility checker may show that your Norton product is incompatible with Windows 10. Not to worry- you’re still protected with the best in-class security for your PC. There will be an update available for a Windows...
February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.
Why is cleaning up your computer important?
Clean software helps protect your data. Internet security software and regular program updates help ensure that viruses, malware, and remote “hackers” stay out of your system. When you maintain your files by backing them up, deleting unused programs,...
A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait. There are three main ways this scam is executed- via cold calls, pop-up messages on the computer and incorrect search engine results.
Software updates can seem like an annoyance, but they are actually critical to the protection of your system.
Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission. Many companies and government agencies actually employ hackers to help them secure their systems.
According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts.
Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
Ransomware has a unique and specific agenda, and one that can be entirely avoided if properly understood.
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.
What Is a Smart Home?
While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. However, these aren’t issues that should deter you from fishing in the sea of online dating.
In this guide, we will take you step-by-step through the entire online dating process. From finding the best dating site, protecting your digital privacy, all the way up to that first date, we’ve got you covered.
Choosing the right site
The cyber-sea of love can be overwhelming to navigate...
With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.
Norton is the leader in digital solutions and we have the best in class digital security solutions available on the market today that’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise. Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you with support whenever you need it most.
We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-ups...
What is Data Privacy Day?
Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint.
DpD is a series of events online and offline intended to bring awareness of the importance of privacy and how to protect it.
Why is Privacy Important?
There are many reasons why maintaining your privacy online is important. Protecting your privacy helps impede the theft of financial information and identities. Howeve...
We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?
Bundled Free Software Programs
Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Guest post by Jeff Barto, Trust Strategist, Evangelist & Website Security Advocate for Symantec
In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013.
This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates- otherwi...
October is National Cyber Security Awareness Month, and we love participating, as it is a way to help further educate everyone about staying safe on the Internet. To kick off the first week, we’re going to give you a crash course in basic cyber security 101. A lot of these topics will come up over the next month, so let’s make sure everyone knows what they mean.
1. Secure Passwords:
The keys to our digital kingdom, passwords should be closely protected. A lot of the times, that’s all a cybercriminal needs to gain access to your account. The following articles not only teach you about HOW...
Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the
A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people a...
The Internet threat landscape was booming last year for cybercriminals. We reported on 54 major events in 2016. And that’s not counting the little stuff. The threat landscape shifted slightly in the past year, and we have seen some new trends. However, some of the older ones are sticking around and still going strong.
New Threat Predictions for 2017
1. The Internet of Things
The First Major Attack on IoT Devices
2016 was the breakout year for attacks on IoT devices. In October, the first massive cyber attack involving IoT devices, such as webcams and DVRs, occurred. The Mirai B...
Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
Is it time to start speaking in code in your living room? Recent tech buzz has fingered voice control on your smart TV as a security risk, listening in on your conversations in order to utilize voice commands, and then sending that information out to third parties. The thought of “always listening” devices using voice commands can seem like a scary thing; however, it’s not as scary as it sounds, just yet. Still it’s important to be aware of potential risks as the growth of speech-to-text technology will more frequently become integrated into new devices entering the market.
In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information.
Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through tha...
We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack.
Types of Social Engineering Attacks
Social engineering is a way that cybercriminals use human-to-human interaction in order get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that at...
Guest Post By Kevin Haley, director, Symantec Security Response
I despise all forms of bullying. Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you, and refuses to give it back. It’s dangled right in front of you, but held just out of reach. You’ll only get it back after doing whatever the bully wants.
Ransomware is an on-line form of the bully’s game of keep-away. Here, the bully gets on your computer and takes your personal files -words documents, photos, financial information, all the things you care about. Those files are still on your ...
A “denial of service” or DOS attack is used to tie up a website’s resources so that users who need to access the site cannot do so. Many major companies, have been the focus of DOS attacks in recent years. Because a DOS attack can be easily engineered from nearly any location, finding those responsible can be next to impossible.
There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything else under the search engine sun. This is known as the “surface web.”
Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet.
Don’t cancel your travel plans just yet. Here are eight cyber security tips for business travelers that are also great tips for anyone planning a holiday abroad:
1. Lock Devices Down
Most smartphones, laptops, and tablets come equipped with security settin...
While Valentine’s Day is for lovers, we bet you didn’t know that there is a holiday for the single folks as well! Singles Awareness Day was created as an alternative to Valentine’s Day, and whether you’re celebrating or commiserating your single status, we’re pretty sure that many of you have crossed paths with an online dating site at some point. Nowadays, online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. 70% of compromised users are wome...
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?
What Is Public Wi-Fi?
Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots”...
One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play along with your children!
First things first, with all apps your children are interested in, download the app and play it yourself to become familiar with what your children will be doing. This way, you can become more informed about the gameplay, and you can talk to your child about how to be safe while using it.
This is part two of a three part series where we are going to delve into examini...
In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my passion for cyber security. Admittedly, I became addicted immediately, which lead me to research how the game works, how to play it, and what the possible security risks are that come along with the game.
Firstly, it is important to note that this game is not your average smartphone game. It uses a technology known as augmented reality, which is a blend of real life and technology. There are m...
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees.
This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Happy Thanksgiving from Norton!
Congratulations on your new device! You’re likely caught up in the fun of having a new gadget, and probably shopping for a shiny (or sparkly) new case. While a case protects your device from nature and clumsy hands, it doesn’t make your phone absolutely safe. Why? Because it doesn’t protect what matters most—your information.
Think about all that you do on your devices—sharing precious photos, ordering your favorite latte, and shopping. With the rise of cybercrime and the high costs associated with it, it’s even more important that you learn how to protect what matters most—the personal i...
To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide.
What Is Privacy?
Privacy is closing your bedroom curtains when getting ready for bed. Privacy is visiting with your doctor behind closed doors. While in real life this type of privacy comes naturally, with little thought, in the digital s...
Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.
Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.
There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.
You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog:
The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox.
Regardless of where the leak originated, this is something we see all too often in the tech and busine...
Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data.
Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts.
In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company...
Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future. Corporations and even smaller businesses are an extremely attractive target to cybercriminals, simply due to the large payday of data that can be stolen.
What Can Cybercriminals Do With My Stolen Data?
You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now.
What can cybercriminals do with my data in the event of a banking or financial institution breach?
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data...
Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape.
As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy.
What is ridesharing?
Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button. In a...
Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information.
The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies.
New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks are becoming the new wave of crime. Corporations and even small businesses are extremely attractive targets to cybercriminals, simply due to the large payday of data that can be nabbed in one fell swoop.
What is a data breach and how and why do they happen?
The main reason that cybercriminals are stealing personal information is for us...
As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more.