• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos6 Stats

How To Recognize and Avoid Tech Support Scams

A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait.  There are three main ways this scam is executed- via cold calls, pop-up messages on the computer and incorrect search engine results.

Read More
Kudos0

What Is Spear Phishing?

Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for your password or other private information, spear phishing takes this trick to the next level, using social engineering. Before you respond to that email asking for you to verify your address or other personal information, read this article to protect yourself against spear phishing.

 

Read More
Kudos4 Stats

Norton – Better, Faster, Stronger and Committed to Your Online Security

At the heart of every Norton improvement is you, real people in real-world situations. Take a look at how our commitment to your security has evolved Norton.

Read More
Kudos2 Stats

The Facts About Jailbreaking iOS Devices

While jailbreaking an iPhone seems to open up the device to limitless possibilities, it is actually, in fact, a large security risk for your phone. Jailbreaking can allow users to bypass many iOS restrictions they might consider limiting, such as being only able to download apps from the Apple iOS App Store and other types of personal customizations of the device. However, this also means that cybercriminals have access to a much larger security hole to attack the device.  All Apple devices carry a “sandboxing” feature that is native in all OS’s. Sandboxing is a program that essentially ...
Read More
Kudos2 Stats

Introducing The Norton Cyber Hero Video Series Volume One: Zach Latta

Meet Zach Latta, a 17-year-old student who started HackEDU to bring coding to high schools across the country.

Read More
Kudos0

Your Evolving Digital Life With the Internet of Things

The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things”  it refers to any object you can connect to with the Internet. These "things" include an array of devices and even systems. Either way, the Internet of Things promises to connect more devices than ever before.

Read More
Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading. The Menace of Mobile Malware Mobile malware is the same kind of malware on computers, except it is engineered for your phones and tablets. Mobile malware is out to get you. Well, the details about you, anyway. As the popularity of smartphones and tablets grows,...
Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Three: Diana Shafer

So far, we've uncovered some amazing young people during our search for the next cyber heroes! In our third installment of this series....

Read More
Kudos1 Stats

The Norton Cyber Hero Video Series Volume Two: Joseph Garcia

As Norton's search for Cyber Heroes continues, we'd like you to meet Joseph Garcia.

Read More