• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. While...
Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Two: Joseph Garcia

As Norton's search for Cyber Heroes continues, we'd like you to meet Joseph Garcia.

Read More
Kudos0

Kirby the North Pole IT Elf Presents: Monitoring Your Financial Accounts

Norton has asked the North Pole’s #1 IT Elf to give you some tips for the Holidays. It might sound simple, but the best way to be safe during the Holidays is to monitor your accounts. Here Kirby gives some simple rules to keeping an eye on your accounts and what to do if you see some thing that shouldn’t be there. Kirby gives you simple steps to stay safe
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Old School vs Digital Wallets

Now that payments are regularly being made from phones and watches, Kirby gives you a run down of why digital wallets are becoming more popular, how they work and some issues to consider.
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags. 

Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Three: Diana Shafer

So far, we've uncovered some amazing young people during our search for the next cyber heroes! In our third installment of this series....

Read More
Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading. The Menace of Mobile Malware Mobile malware is the same kind of malware on computers, except it is engineered for your phones and tablets. Mobile malware is out to get you. Well, the details about you, anyway. As the popularity of smartphones and tablets grows,...
Read More
Kudos0

Kirby the North Pole IT Elf Presents: Holiday Scams

Meet Kirby the IT Elf, and Santa's right hand technology man. As the Holidays quickly approach, so do a fresh crop of scams. In this episode, Kirby highlights the most popular scams this year, how to spot them and how to be safe.

Read More
Kudos1 Stats

Norton Family Premier Receives PC Magazine Editor’s Choice Award

The Internet, social media and mobile technology make it harder than ever to keep your kids safe. Norton Family Premier, recent recipient of the PC Magazine Editor’s Choice Award is an invaluable tool to help you help your kids. Lead Security Analyst at PC Magazine, Neil Rubenking, cited the “impressive range of parental control and monitoring features for parents of today’s hyper-connected kids.”

Read More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy. What is ridesharing? Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button.  In a...
Read More
Kudos2 Stats

Thanksgiving - Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.

Read More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.. But have you ever thought that way about what is on your tablets, computers and mobile phones? Right now, most folks have hundreds of phot...
Read More
Kudos2 Stats

Cybercrime Survival Toolkit- Surviving The Most Dangerous Town On The Internet

As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more. ...
Read More
Kudos3 Stats

DOS Attacks Explained

A “denial of service” or DOS attack is used to tie up a website’s resources so that users who need to access the site cannot do so. Many major companies, have been the focus of DOS attacks in recent years. Because a DOS attack can be easily engineered from nearly any location, finding those responsible can be next to impossible.

Read More
Kudos2 Stats

The Future of the Connected Home: Security in the Internet of Things

4.9 billion connected things are expected to be in use in 2015, increasing to 25 billion by 2020. Many of these smart devices can be found in the connected home. Symantec researchers have found that smart home devices have basic security issues, such as weak authentication and common web vulnerabilities. These can be exploited by hackers posing a privacy and security risk. Safeguards against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks and actionable tips to stay safe in the internet of things...
Read More
Kudos0

Building the Next Generation of Cyber Professionals

As more of what we do online grows, so does the need for cyber security professionals. Now that everything is connected, criminals are shifting their focus to the Internet landscape, utilizing social engineering and other types of scams to obtain financial and personal data from unsuspecting victims.

Read More
Kudos2 Stats

Lunar New Year Online Security Tips

It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online. Norton wishes you an exciting (and secure!) year ahead!
Read More
Kudos0

How Do Cybercriminals Make Money?

Since most of what we do is now online, from shopping for food to paying bills, the global economy is taking a digital shift. It’s only natural for criminals to follow suit. As criminals consider the economics of what they do, they recognize cybercrime as one of the quickest ways for them to make money. For a hacker, extortion is an easy way to monetize stolen information and provides the shortest path from cybercrime to cash. In addition to extortion, criminals can make money off of fake auctions, stealing someone’s identity, and by selling stolen information such as credit card numbers, ...
Read More
Kudos4 Stats

Data Privacy Day 2015

What is Data Privacy Day? Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint. DpD is a series of events online and offline intended to bring awareness of the importance of privacy and how to protect it. Why is Privacy Important? There are many reasons why maintaining your privacy online is important. Protecting your privacy helps impede the theft of financial information and identities. Howeve...
Read More
Kudos1 Stats

Mobile Security Smarts: How Hack-Proof are Your Mobile Habits?

With holiday gift-giving going mobile, are you eyeing a new device? More than half of holiday shoppers plan to purchase a tech accessory this season, with TVs, tablets, and smartphones topping many wishlists. While two-thirds of those shoppers plan to use a mobile device to help them make holiday purchases (according to ce.org). Do you have the right habits to keep a shiny new device secure? Put your mobile habits to the security test. Top takeaways for smarter mobile security. Be cautious of connecting to public wi-fi and mobile hotspots while you’re on the go. These networks are n...
Read More
Kudos3 Stats

Top 10 Small Business Resolutions & Strategies To Achieve Them

With the New Year ahead, and cyber threats continuing to loom over businesses, 2015 will likely bring more sophisticated and complex attacks. Security analysts called 2013 “The Year of The Mega Breach.” According to Symantec’s 2014 Internet Security Threat Report, businesses saw a 91 percent increase in targeted attacks and a 62 percent increase in the number of breaches. Additionally, the recent string of credit card breaches targeting major retailers also provide further reminder that cybercrime remains prevalent and that cyber threats show no sign of slowing down. The exploitable vuln...
Read More
Kudos2 Stats

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips: Online Security at Events Practice Safe Sharing. Check the privacy settings on your social networks to make sure you know who has access to what information. Also, think twice before posting your real-time location or photos to social networks. Whi...
Read More
Kudos1 Stats

Spring Break and Mobile Device Safety

Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; ...
Read More
Kudos2 Stats

Spring Cleaning to Secure Your Digital Life

Tidy Up Your Digital Life It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started: Cleanup your PC workspace: Some programs automatically create a short-cut that will be displayed as an icon on your desktop. Deleting short-cuts that you don’t use will not delete the program, but it will keep your desktop clean and organized.   Get organized: Create categories for your files (work, financial statements, family photos, kids’ homework, etc.), then create and label folde...
Read More
Kudos0

Your Evolving Digital Life With the Internet of Things

The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things”  it refers to any object you can connect to with the Internet. These "things" include an array of devices and even systems. Either way, the Internet of Things promises to connect more devices than ever before.

Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos2 Stats

Introducing The Norton Cyber Hero Video Series Volume One: Zach Latta

Meet Zach Latta, a 17-year-old student who started HackEDU to bring coding to high schools across the country.

Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos0

Apple’s iOS 9 Shines The Spotlight On Security

It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, such as the iCloud photo breach, an iCloud password vulnerability, and the more recent keyraider malware, Apple took notice and significantly upped their security game. Private Means Private! iOS 9 will not tie any usage data to an Apple ID or any other Apple service. The data is now completely anonymized, and Apple states that they w...
Read More
Kudos2 Stats

The Facts About Jailbreaking iOS Devices

While jailbreaking an iPhone seems to open up the device to limitless possibilities, it is actually, in fact, a large security risk for your phone. Jailbreaking can allow users to bypass many iOS restrictions they might consider limiting, such as being only able to download apps from the Apple iOS App Store and other types of personal customizations of the device. However, this also means that cybercriminals have access to a much larger security hole to attack the device.  All Apple devices carry a “sandboxing” feature that is native in all OS’s. Sandboxing is a program that essentially ...
Read More
Kudos1 Stats

How to Clean Up Your Online Digital Footprint

Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases.  When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.

Read More
Kudos2 Stats

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now. What can cybercriminals do with my data in the event of a banking or financial institution breach? Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
Read More
Kudos1 Stats

Online Dating and Protecting Your Privacy

This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers. What are the risks? As with anything you post online, it’s out there for everyone to see, so you will want to be careful with what identifiable information you u...
Read More
Kudos2 Stats

Norton Mobile Security Receives AV-TEST Innovation Award

Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape. As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
Read More
Kudos6 Stats

What Is a Virus #30SecTech

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that...
Read More
Kudos0

8 Elements to Help You Become a Great Digital Citizen

"Digital Citizenship" is the umbrella term used to describe the expectations of a digital citizen. If you use the Internet on a regular basis, you are a digital citizen! Just like being a citizen in the physical world, a lot of the same rules apply when you are a citizen of the digital world. Here are eight elements that embody what it takes to be a good digital citizen: Digital commerce: Citizens should recognize that a large share of the economy is now based online. As a result, there are both pros and cons to e-commerce, and a good digital citizen should not only be aware of the bene...
Read More
Kudos1 Stats

A New Look into Cybercrime- “In Search Of The Most Dangerous Town On The Internet”

Cybercrime is on the rise, and although it may seem like it is faceless crime, it is not. “In Search Of The Most Dangerous Town On The Internet” takes a deep, personal look into the real world of cybercrime. The Romanian town Râmnicu Vâlcea, also known as, "Hackerville", is home to many notorious scammers and convicted blackhat hackers, such as Guccifer, who was responsible for the Hillary Clinton email hack. Through their own words, they discuss their methods for deploying malicious worms, viruses, social engineering scams, stealing identities, and the surprising...
Read More
Kudos1 Stats

How Do Businesses Get Hacked?

While organizations may have some of the best security in the world protecting their information, there are people who are in charge of creating and handling that information.. Because people’s brains are impossible to secure via software, social engineering plays a key role in allowing cybercriminals to bypass computers and security software to commit acts of cyber espionage. Attacks on governments, healthcare institutions or any other organization, require a special blend of both social engineering tactics and technical attacks. The most common form of attack used to infiltrate a governm...
Read More
Kudos1 Stats

How to Keep Your Personal Information Safe on Social Media

Social media runs a significant portion of people’s social lives.  We use it to connect with far-flung friends and family, send quick messages to co-workers, and announce major (and minor) events in our lives.

Read More
Kudos4 Stats

Windows 10: New Security Features and the Role of Third Party Security

Just like everyone else, we’re excited about Windows 10 this year. We particularly look forward to new security improvements that Microsoft brings to Windows with each new release. While this may sound like a strange position for a security company to take, the reason why we welcome these improvements is that every security improvement, no matter how big or small, is bad for hackers and criminals and good for consumers.  Like the majority of customers in the market, we’re also customers of Microsoft Windows and we recognize that Microsoft Windows is an attractive target for criminals.

Even with all of the new features, Microsoft Windows’ “attack surface” continues to grow with each new release. Microsoft-developed security improvements and features can play an important role in helping to reduce the attack surface of each new Windows release.

Read More
Kudos0

College Kit: How To Keep Devices Secure and Information Safe

College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence. College and technology go hand-in-hand. You use your computer for research and term papers, your phone to keep track of your class schedules, and your tablet to keep up with old and new friends on social media. Technology is a great tool for connecting us all, but that’s the thing- it connects EVERYONE- including cybercriminals.  For e...
Read More
Kudos4 Stats

Norton – Better, Faster, Stronger and Committed to Your Online Security

At the heart of every Norton improvement is you, real people in real-world situations. Take a look at how our commitment to your security has evolved Norton.

Read More
Kudos1 Stats

Social Engineering Scams on Social Media

Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction. By ‘engineering’ a believable scenario, criminals are able to manipulate users to act on otherwise risky behavior. There’s a dark art to this skill, and it’s one that can cause you and your online network a great deal of distress should you become compromised. Socia...
Read More
Kudos1 Stats

Safe Online Shopping For The Holiday Season

The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic, especially during Black Friday and Cyber Monday.

Read More
Kudos2 Stats

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts. In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company...
Read More
Kudos2 Stats

Users Believe Using Public Wi-Fi Riskier than Using a Public Restroom

With the Internet threat landscape rapidly growing, online crime has become a fact of life. While we read about breaches and identity theft every day in our news outlets, we wanted to better understand Norton Cybersecurity Insights Report how you, the consumer, are impacted on a more human level. The Norton Cybersecurity Insights Report captures how consumers perceive and react to online transactions and threats prevalent on the Internet today.

Read More
Kudos4 Stats

Norton's Support Commitment And Our Virus Protection Promise

Norton is the leader in digital solutions and we have the best in class digital security solutions available on the market today that’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise.  Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you with support whenever you need it most. We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-ups...
Read More
Kudos3 Stats

How do Zero-Day Vulnerabilities work: #30SecTech

What is a software vulnerability? In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that can be exploited by cybercriminals. Why do vulnerabilities pose security risks? Hackers write code to target a specific security weakness and package it into exploit malware, a type malicious software that takes advantage of a vulnerability in o...
Read More
Kudos0

What Is Spear Phishing?

Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for your password or other private information, spear phishing takes this trick to the next level, using social engineering. Before you respond to that email asking for you to verify your address or other personal information, read this article to protect yourself against spear phishing.

 

Read More
Kudos3 Stats

Public Wi-Fi Security 101: What Makes Public Wi-Fi Vulnerable To Attack And How To Stay Safe

Nowadays, free public Wi-Fi is widely and readily available in larger cities—airports, restaurants, coffee shops, libraries, public transport, hotel rooms, you name it. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. However, the security risks should not be forgotten. While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be awar...
Read More