• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

'Backoff' Malware Steals Customer Credit Cards From 600 Stores

Last week, the Department of Homeland Security reported that around 600 businesses fell prey to a Point of Sale malware, called “Backoff”, that steals customer payment details through remote access applications. Most of the businesses affected were small, independent brick-and-mortar retailers, but some larger chains were impacted as well. The scope of the attacks could widen as more affected businesses are discovered. Unfortunately, this kind of criminal activity is growing. Identity theft, according to the Bureau of Justice Statistics, affected 16.6 million people in 2012. Hackers often...
Read More
Kudos0

2014 Mobile Trends: Norton at CES

Mobile technologies sure-to-trend in 2014 include "smart" connected devices and wearable gadgets. With 2.88 billion people reached by the #CES2014 hashtag, according to the Consumer Electronics Association, this new tech is growing in popularity in no time. Watch the best-of from Norton at CES. Did you miss the Norton Truck interactive mobile privacy experience at CES? You can still try Norton Mobile Security for free, here: https://mobilesecurity.norton.com/  Read on for more quick tips to protect your mobile privacy: Protect your private info: Did you know? 1-in-4 smartphone user...
Read More
Kudos0

3 Hot Mobile Security Tips For Summer Travel

Summer’s finally here, so whether you intend to take a picnic to the park, play with the children in the garden or jet off to somewhere even sunnier, some simple precautions will keep you and your devices safe this summer. Watch your devices First up, physical security. With more outdoor activity it’s natural that it won’t only be your smartphone that travels with you. Parks these days are full of tablets and even lightweight laptops, to go with the many Kindles and Bluetooth speakers, so it pays to be aware of just how valuable your possessions are. Don’t leave them lying in plain sight...
Read More
Kudos2 Stats

5 Small Business BYOD Security Tips

The world of business has to move with the times, and right now that means it makes a lot of sense to allow staff to use whatever devices they have for work. BYOD – bring your own device – is here to stay, and if implemented properly can be a real boon to the productivity and happiness of your employees. They get to use a device they’re comfortable with, and you get to slash your hardware deployment costs. But BYOD brings with it new risks to the security of sensitive company data, with employees taking their main work systems out of the office with them at the end of the day. Rather than ...
Read More
Kudos0

5 Tips for smarter, safer mobile banking

The rise of the smartphone has brought countless technological benefits that make our daily lives easier in so many ways, and one of the biggest has been the freedom of mobile banking. Gone are the days of waiting in a busy branch on a Saturday afternoon to transfer money into your savings account, or calling an automated number to check your balance. But having your bank accounts within such close reach does bring its dangers, and it shouldn’t simply be assumed that logging in and doing your banking can now be done at any time and in any place. Here are five quick tips to keeping your mon...
Read More
Kudos0

5 Tips for Social Media Security and Privacy

Social media accounts are powerful tools in the wrong hands. We’ve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam to drawing attention to global issues. Your own accounts might seem too small to tempt scammers, but even with just a few followers your information is a valuable commodity. Read on for tips to stay safe on social networks.   Use unique passwords for each social network It’s a pain, but it is also absolutely essential that you don’t use the same password for Twitter as you do for, say, Facebo...
Read More
Kudos1 Stats

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1 Stats

Android AOSP Browser Bug Could Affect 75 Percent Of Users

A new Android vulnerability, which could allow attackers to view open Web pages on the victim’s Android Web browser or hijack their online accounts, has recently been uncovered, and may impact an estimated 75 percent of android users.   Uncovered in early September, by security researcher, Ray Baloch, the Google Android Browser Same Origin Policy Security Bypass Vulnerability (CVE-2014-6041) reportedly affects any Android version below 4.4. The bug, found in the Android Open Source Project browser (or AOSP browser—a browser that Google no longer supports), could be exploited by an attacke...
Read More
Kudos1 Stats

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device. Earlier this year, Symantec’s Internet Security Threat Report noted that mobile malware in 2013 was developed almost exclusively for the Android OS, 32% of which steals a user’s personal information. Luckily, Google says that no e...
Read More
Kudos2 Stats

Android vs iOS: Which is More Secure?

They’re both selling by the millions, with no sign of slowing down, but there are big differences between the iOS and Android mobile platforms – not least in the array of security threats they face, and the ways in which they attempt to mitigate them. You’re never totally secure when using a mobile device on either platform, but should the security conscious be choosing one over the other? The Threat Level If we’re talking purely about the level of threat that exists on the two platforms, it would seem iPhone and iPad users have the better side of the deal. Studies have found that a fa...
Read More
Kudos2 Stats

Antivirus-Only Is Dead. Long Live Security!

Are you doing enough to keep your information safe? With today’s sophisticated cyber threats you need more than just traditional antivirus (AV) software to stay protected. AV software can prevent, detect and remove malicious computer programs, and while more traditional viruses and email spam still exist, people now have more complex threats to worry about – and more important information to protect.  You need to guard your devices from not only viruses and worms, but web threats, spam and phishing. Cybercriminals can also use drive-by methods for stealing information and concealment malw...
Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Back Up Your Finals and Midterms to the Cloud

In today’s fast-paced world, you can be sure that most universities have gone digital. As a result, more students are saving their important papers on their computers and external hard drives. However, from what I’ve seen, that’s about as far as most students go to safeguard their work. With so many hours (and lost sleep) going into these papers, it is essential to make sure you have it backed up in the cloud, because there would be nothing worse than losing all of your hard work due to a computer crash or hard drive failure.   If you only save your work on a hard drive, once your compute...
Read More
Kudos1 Stats

BYOD And Protecting Your Mobile Workforce

BYOD is growing in popularity within small businesses. In this article we will discuss how to let your employees use their own devices and keep your company's data safe.

Read More
Kudos0

BYOD in K-12 Schools: 5 Tips to Help Parents Keep Their Kids Safe

   Despite controversial beginnings, many school districts across the United States are embracing BYOD—bring your own device—in the classroom by expanding curriculum to include student owned devices. With this trend gaining momentum, some districts are starting to run pilot programs to explore the benefits of bringing mobility to classrooms through BYOD. Rather than fighting against change, forward thinking school districts are moving into 21st century learning environments because they recognize the advantages of incorporating tehcnology and learning applications into the classroom to bet...
Read More
Kudos0

BYOD vs. CYOD: What's The Best Fit For Your Business?

The last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature. But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every e...
Read More
Kudos4 Stats

Cookies and Your Online Privacy: #30SecTech video

Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out. First, an introduction to cookies Cookies are small text files that are placed on your computer or mobile device by websites you visit or certain emails you open. In essence a cookie notif...
Read More
Kudos0

Cyber Security Concerns and Smartphones

More people own smartphones than PCs in today's market, and that makes the mobile platform extremely desirable to cybercriminals. Learn how to secure your personal data.

Read More
Kudos0

Cybersecurity Trends and How-to Protect Your Business

Information security is more important than ever when it comes to safeguarding small business. According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. In 2014, we identified a few technology trends that will have a direct impact on small businesses and the way they protect business critical information. All eyes will be on protecting Privacy From scary headline news to a much-needed wake-up call, consumers and sma...
Read More
Kudos1 Stats

Data Breach - The Best Defense is Vigilance

There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is understanding what the thieves are after, so you can make it harder for them to win. Egan answers some commonly asked questions about shopping and credit card safety: So what is being stolen and how is it being used? In point of sale (POS) breaches, thieves are stealing your 16-digit credit card numbers. Those numbers are most useful to thieves (and ...
Read More
Kudos2 Stats

Dr. Strangebug, or How I Learned to Stop Worrying and Accept Heartbleed

By Satnam Narang, Symantec Security Response expert. No matter where you went this week, you likely heard about something called Heartbleed. If you happened to be living under a rock (some might say you were better off there), you may not have heard that there was a major vulnerability discovered in OpenSSL, the open source implementation of the protocols used to secure communication over the Internet. The reason it received a lot of attention is because a half a million trusted websites were vulnerable at the time this news first came to light. Does this mean the Internet is broken or is...
Read More
Kudos2 Stats

Exactly How Free Is That Free App?

There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.

Read More
Kudos0

Five Ways to Save "Face" Online

There’s a reason why Facebook is celebrating it's 10th birthday today! Social networking sites are great for keeping in touch with friends and family, for telling people what you’re up to, and for finding out what’s happening in your part of the world. Though this does come with risks. Each time you post, “like”, share a photo or check-in somewhere, you’re providing a little more information about yourself. You’re discarding a little more of your privacy… and arguably, you’re leaving yourself at risk of identity theft. To help you on your way, here are our top 5 tips to help you enjoy y...
Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats. You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs wa...
Read More
Kudos1 Stats

Get to Know Firewalls 101 - #30SecTech

As the name implies, a firewall is a protective barrier and its job is similar to that of a physical firewall. They stand between your computer and the rest of the digital world to keep you protected from online threats. A firewall is a software program or piece of hardware that secures your computer by limiting who can send you information. All information entering or leaving a network passes through a firewall, which either allows or blocks information based on specified security criteria. How does a firewall protect you? They prevent unauthorized users from ...
Read More
Kudos1 Stats

Happy Thanksgiving!

Read More
Kudos2 Stats

Heartbleed Bug: What You Need to Know and Security Tips

What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more: "Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Read More
Kudos2 Stats

Holiday Security Tips: an Online Shopping Checklist

We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores. Remember these key tips to shop safely online: Don't click on unsolicited emails or links to "deals" that seem to good to be true. Use the latest, updated version of your internet browser. Check to ensure your purchases and transactions are taking place on a secure site. Read more: The 12 Scams of Holidays Past What is the Safest Way to Pay This Holiday Season?
Read More
Kudos0

How Can Small Businesses Develop Trust with Customers?

In a small business, your top priority when dealing with customers is trust. Recent high-profile security breaches have eroded consumer confidence, and it’s more important than ever to reassure your customers that they’re safe shopping with you. According to Symantec’s Sr. Director of Product Management, Robert Hoblit, the vast majority of visitors to any shopping site will arrive through web search or advertising, and first impressions are vital. “Around 80% of the customers that land on your website are actually first-time buyers,” he says. “They’ve never seen you before, they’ve never ...
Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos5 Stats

How do Hackers Steal Passwords: #30SecTech Video

Passwords are to a hacker like keys to a thief. Although keys and passwords by themselves don’t have much value, the personal information and property that they can expose does. Think of your passwords as your digital keys. They allow access to your personal life, including your networks of friends and colleagues, contacts, photos, videos, emails, and maybe even banking and payment details, among other gems of information. Weak passwords can be easily guessed, and taking poor security measures could provide information instrumental for password hackers. However, ...
Read More
Kudos1 Stats

How Safe Is That App? Mobile Security Expert Tips To Help Protect Your Mobile Device.

Mobile apps have transformed the way we interact with our smartphones and tablets. If you’re looking for a quick way to access your bank accounts, a tool to make you more productive while on the move, or a game to help pass the time while you’re waiting for a bus, there’s an app for that. In fact, with over 1 million apps on Google Play, for instance, there are often thousands of options to choose from in each app category. The fact that many can be downloaded in a matter of seconds means that you’re only ever moments away from installing a tool that could bring innovative new functionali...
Read More
Kudos1 Stats

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.

Read More
Kudos3 Stats

How To Avoid Scams When Buying Norton Security Software This Holiday Season

If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your digital and personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software. If your goal is to protect your devices and your identity, you can’t afford to take chances. There are two things you can do to avoid purchasing fraudulent security and antivirus software. First, do your research, educate yourself, and be cautious. Second, purchas...
Read More
Kudos2 Stats

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.

Read More
Kudos3 Stats

How to Counterattack Mobile App Security Risks and Stay Protected

The mobile apps we use can provide other parties access to our information and everything on our devices. Our smart devices are powerful computers, containing valuable information, such as passwords, contacts, phone numbers, photos, videos, and maybe even banking details. Thus, it’s very important to understand the privacy and security implications that come with using any app. Guard your information by exercising caution and by taking three simple steps.

Read More
Kudos1 Stats

How To Protect Yourself From Cyberstalkers

With the wealth of information available online, this makes it easier for Cyberstalkers to gain access to their victims. Read on to learn about ways to keep your personal information hidden from unwanted eyes.

Read More
Kudos1 Stats

How To Protect Yourself From Phishing Scams

Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.

Read More
Kudos2 Stats

How to Spot a Fake Android App

Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Read More
Kudos2 Stats

How To Stay Safe Online During Black Friday and Cyber Monday Holiday Shopping

The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. Don’t let the numerous deals and distractions cloud your judgment; it’s always important to pay attention to signs that your transactions are secure. You can still shop online and take advantage of Black Friday and Cyber Monday deals with peace of mind. You just have to know what to look for and adhere to simple safety measures.

Read More
Kudos0

How will the end of Windows XP impact you?

The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, an estimated 30 million desktop operating systems still run on Windows XP today and could be left vulnerable after April 8.  At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your personal infor...
Read More
Kudos0

In Defense of Devices: Cyber Security Concerns Spread Beyond Your Phone

We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly. As the report states, last year saw high-profile hacks of baby monitors, security cameras and even home routers by cybercriminals. Meanwhile, security researchers dug around in the software of other devices...
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos0

Is connected car data the next privacy concern?

GPS devices have made driving so much simpler in recent years, and it’s hard to find a driver today who does not use one for long journeys. But what are the downsides to being constantly connected when driving? While you’re getting vital information to help you reach your destination, what vital information of yours is flowing the other way? One big car maker was recently forced to deny that it collects and shares personal data on drivers and their habits through their GPS devices, but we’ve seen time and time again that all that gatherable information can prove too tempting for a company...
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud? My answer? Absolutely not. Zone is only one cloud service, among many, that Syman...
Read More
Kudos12 Stats

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves. With th...
Read More
Kudos4 Stats

Keep Everyone Protected When Handing Down Mobile Devices This Holiday Season

It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists. And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season. Protect your holiday hand-me-downs To many consumers handing down or selling their device may seem like a har...
Read More
Kudos0

Keeping Your Business Safe From Attack

According to the 2014 Symantec Internet Security Threat Report, which examines the data from more than 41.5 million attack sensors and records thousands of events per second, spear phishing is not dead – it’s merely evolving. The technique uses fake emails to target a specific organisation in order to gain access to internal data, and although attackers used fewer emails on fewer targets last year, the total number of spear-fishing campaigns was up a startling 91%. More user awareness and better security means attackers are simply choosing their targets more carefully and sharpening their ...
Read More
Kudos0

Keeping Your Mobile Fitness Data Secure

October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape. The advancement of technology brings tools that can allow us to track every facet of our daily lives: what we eat, how we sleep, how much we run, and even vital signs like heart rate and blood pressure. On the ...
Read More