• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos5 Stats

The Real Cost of Free: #30SecTech Video

With plenty of free security software options out there, it’s easy to wonder why you would want to pay for online protection. But is free antivirus software truly free? Internet connected devices are constantly within reach and as a result more aspects of our lives and information reside within our devices than ever before. Yet many people still see their online world and the physical world as separate from each other, not realizing that online information is as valuable to cyber criminals as a wallet is to a mugger. It’s not until a data breach makes headlines t...
Read More
Kudos5 Stats

How do Hackers Steal Passwords: #30SecTech Video

Passwords are to a hacker like keys to a thief. Although keys and passwords by themselves don’t have much value, the personal information and property that they can expose does. Think of your passwords as your digital keys. They allow access to your personal life, including your networks of friends and colleagues, contacts, photos, videos, emails, and maybe even banking and payment details, among other gems of information. Weak passwords can be easily guessed, and taking poor security measures could provide information instrumental for password hackers. However, ...
Read More
Kudos4 Stats

Cookies and Your Online Privacy: #30SecTech video

Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out. First, an introduction to cookies Cookies are small text files that are placed on your computer or mobile device by websites you visit or certain emails you open. In essence a cookie notif...
Read More
Kudos4 Stats

Point of Sale Malware Attacks Explained - #30SecTech

As consumers around the country get ready for another holiday shopping season, hackers are likely gearing up with Point-of-Sale (POS) malware kits. Over the past year many US retailers—big and small—fell victim to mega-breaches that compromised approximately 100 million payment cards, potentially affecting about one-third of US consumers. Some retailers have taken measures to secure their POS terminals, but until a complete transition to more secure payment technologies is made, many retailers are still vulnerable to POS attacks. Therefore, it is up to consumers t...
Read More
Kudos2 Stats

System Admin Day 2014! Reasons to Thank Your System Administrator Today (and Everyday).

Today marks the 15th annual System Administrator Appreciation Day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day here are a few of the top reasons to say thanks. Thank your SysAdmin on System Adminstrator Appreciation Day! When your server goes down at midnight on a Saturday, a sysadmin IT pro has everything up and running by 9a.m. on Monday. That lovely interwebz connection you are accessing to view this very blog from your office network – all thanks to a sysadmin’s handiw...
Read More
Kudos2 Stats

Heartbleed Bug: What You Need to Know and Security Tips

What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more: "Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Read More
Kudos2 Stats

Securing the Internet of Things - #30SecTech video

Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT). The Internet of Things allows wearable devices such ...
Read More
Kudos2 Stats

Pandora #BoldlyGo Concert Series feat Thurston Moore

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans! HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY Date: Thursday December 11th, 2014 Time: Doors at 7:00 pm Location: Marlin Room @ Webster Hall Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at Marlin Room @ Webster Hall 12/11/201...
Read More
Kudos2 Stats

Holiday Security Tips: an Online Shopping Checklist

We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores. Remember these key tips to shop safely online: Don't click on unsolicited emails or links to "deals" that seem to good to be true. Use the latest, updated version of your internet browser. Check to ensure your purchases and transactions are taking place on a secure site. Read more: The 12 Scams of Holidays Past What is the Safest Way to Pay This Holiday Season?
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos1 Stats

Tips to Protect Your Financial Information

Protecting your financial information is important, and it doesn’t have to be difficult. When on-the-go tools such as mobile banking apps make managing financial tasks easy, you should also take precautions to manage the risk of accessing sensitive financial information anytime, anywhere. This Credit Education Month, practice safe online habits with a few easy tips. Taking Basic Security Precautions Take precautions to make sure that your online financial management activities are secure. Be aware and vigilant by practicing these safe online habits: Make sure the websites with which you...
Read More
Kudos1 Stats

Scammers' Tricks You Don’t Want To Be Fooled By

Unlike April Fools, which only happens once a year, scammers make a living off of fooling users 365 days a year. Here are a number of tricks that scammers use. Phishing Scams: Whether it’s pretending to be your financial institution or a tweet from someone you know, asking, “Is this photo of you?”, phishing scams are after your login credentials to sites that are important to you. Recently, users of Google Drive and Google Docs were targeted in a sophisticated phishing scam. Phishing remains one of the most common scams used because they work, and as these scams become more innovative, th...
Read More
Kudos1 Stats

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to b...
Read More
Kudos1 Stats

Pandora #BoldlyGo Concert Series feat G. Love & Special Sauce

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans! HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA Date: Tuesday, November 11th, 2014 Time: Doors at 7:00 pm Location: 777 Valencia St, San Francisco, CA 94110 Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at The Chapel in San Francisco, ...
Read More
Kudos1 Stats

Get to Know Firewalls 101 - #30SecTech

As the name implies, a firewall is a protective barrier and its job is similar to that of a physical firewall. They stand between your computer and the rest of the digital world to keep you protected from online threats. A firewall is a software program or piece of hardware that secures your computer by limiting who can send you information. All information entering or leaving a network passes through a firewall, which either allows or blocks information based on specified security criteria. How does a firewall protect you? They prevent unauthorized users from ...
Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats. You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs wa...
Read More
Kudos0

Quick Tip Guide to Kids' Social and Mobile Privacy

You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps. You can have the usual parent-child conversations about not chatting to strangers and not revealing too much about themselves, but sometimes the apps take matters into their own hands and give away more than they should. Check out these quick steps you can take to make socia...
Read More
Kudos0

2014 Mobile Trends: Norton at CES

Mobile technologies sure-to-trend in 2014 include "smart" connected devices and wearable gadgets. With 2.88 billion people reached by the #CES2014 hashtag, according to the Consumer Electronics Association, this new tech is growing in popularity in no time. Watch the best-of from Norton at CES. Did you miss the Norton Truck interactive mobile privacy experience at CES? You can still try Norton Mobile Security for free, here: https://mobilesecurity.norton.com/  Read on for more quick tips to protect your mobile privacy: Protect your private info: Did you know? 1-in-4 smartphone user...
Read More
Kudos0

Mobile Security Resolutions for the New Year

  Welcome to the new year! Now that the holidays are a wrap if you're like many, you may have received the gift of mobile this year. In fact, 74% of U.S. consumers intended to give consumer electronics as presents (CEA). But while new mobile trends are in fashion for 2014, mobile cybercrime threats are trending also. More than 1/3 of smartphone users have experienced mobile cybercrime (2013 Norton Report). That means, resolution number one on your list should be to security protect your shiny, new mobile devices and tablets.     Mobile Malware: How-to Protect Your Smartphone and Tablet ...
Read More
Kudos0

Lunar New Year Security Checklist

Because you should be spending your time enjoying the festivities, here are a few security tips for Lunar New Year. Wishing you a fun, safe celebration and year ahead from Norton! Will you capture irreplaceable memories this Lunar New Year? Try Norton Zone for free, a safer and easier way to share files with family and friends.
Read More
Kudos0

Five Ways to Save "Face" Online

There’s a reason why Facebook is celebrating it's 10th birthday today! Social networking sites are great for keeping in touch with friends and family, for telling people what you’re up to, and for finding out what’s happening in your part of the world. Though this does come with risks. Each time you post, “like”, share a photo or check-in somewhere, you’re providing a little more information about yourself. You’re discarding a little more of your privacy… and arguably, you’re leaving yourself at risk of identity theft. To help you on your way, here are our top 5 tips to help you enjoy y...
Read More
Kudos0

Stay Safe in Sochi

As a tourist in a foreign city, especially a chilly one hosting hundreds of thousands of people from all over the world this weekend, it’s probably wise for you to learn a few key phrases to protect yourself, like: Спасите! (Spasite!) “Help!” Пожар! (Požar!) “Fire!” Стой! (Stoj!) “Stop!” …but, what if you need to protect your mobile device or laptop? These phrases are pretty ineffective against cyber crimes.  The U.S. Computer Emergency Readiness Team reports that possible targeted attacks could appear in the form of spam, phishing scams, fake websites, or drive-by download campaigns, an...
Read More
Kudos0

Is connected car data the next privacy concern?

GPS devices have made driving so much simpler in recent years, and it’s hard to find a driver today who does not use one for long journeys. But what are the downsides to being constantly connected when driving? While you’re getting vital information to help you reach your destination, what vital information of yours is flowing the other way? One big car maker was recently forced to deny that it collects and shares personal data on drivers and their habits through their GPS devices, but we’ve seen time and time again that all that gatherable information can prove too tempting for a company...
Read More
Kudos0

5 Tips for Social Media Security and Privacy

Social media accounts are powerful tools in the wrong hands. We’ve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam to drawing attention to global issues. Your own accounts might seem too small to tempt scammers, but even with just a few followers your information is a valuable commodity. Read on for tips to stay safe on social networks.   Use unique passwords for each social network It’s a pain, but it is also absolutely essential that you don’t use the same password for Twitter as you do for, say, Facebo...
Read More
Kudos0

How will the end of Windows XP impact you?

The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, an estimated 30 million desktop operating systems still run on Windows XP today and could be left vulnerable after April 8.  At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your personal infor...
Read More
Kudos0

World Backup Day and Digital Spring Cleaning

March 31 marks World Backup Day! What is backup? It's a second copy of all your most important files like financial documents, family photos, videos and more. While it's best to backup your files regularly now is as good a time as ever.  Here are a few more tips for digital spring cleaning! Read on.    Five easy ways to get started on digital spring cleaning:   Be sure your software is up to date. Ignoring the latest software updates could put you at risk. Companies announce security vulnerabilities as they are discovered and quickly work to fix the vulnerabilities with software updates,...
Read More
Kudos0

Cybersecurity Trends and How-to Protect Your Business

Information security is more important than ever when it comes to safeguarding small business. According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. In 2014, we identified a few technology trends that will have a direct impact on small businesses and the way they protect business critical information. All eyes will be on protecting Privacy From scary headline news to a much-needed wake-up call, consumers and sma...
Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.     Follow these secure Wi-Fi ha...
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click. While it is unfortunate that scammers would look to capitalize on this tragic incident, this is a common t...
Read More