"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year."
Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.
We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year.
The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.
Is it time to start speaking in code in your living room? Recent tech buzz has fingered voice control on your smart TV as a security risk, listening in on your conversations in order to utilize voice commands, and then sending that information out to third parties. The thought of “always listening” devices using voice commands can seem like a scary thing; however, it’s not as scary as it sounds, just yet. Still it’s important to be aware of potential risks as the growth of speech-to-text technology will more frequently become integrated into new devices entering the market.
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.
What Is a Smart Home?
While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.
October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape.
The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security
Mountain View, Calif. – Jan. 3, 2017 – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for pre-orders today and will change the way people secure their connected homes.
Today’s home networks, b...
Experiencing and using the latest innovations in technology is always exciting—and wearable devices are no exception. Driven by technological advances, social factors, and the Internet of Things, consumers everywhere are enthusiastically embracing wearable technology. As a result, being connected to the Internet is becoming a part of daily life, creating a reality where the physical and digital worlds intersect and overlap at an unprecedented rate, often leaving security behind.
Physical-Digital Innovations Allow Us To Experience The World In Unprecedented Ways
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees.
This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.
It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of ou...