You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.
As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.
Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.
Phishing scams have one objective- gaining access to your money. Cybercriminials are always trying different tactics to try to trick you out of your personal information. Read on to learn how to spot a scam and protect yourself against scams and spyware.
With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts.
Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key.
Types of Ransomware
Ransomware can present itself in two forms.
Locker ransomware will encrypt the whole hard drive of the computer, essentially locking the user out of the entire system.
Crypto ransomware will only encrypt specific, seemingly important files on the computer, such as word documents, PDFs and image files.
Once the ransomware installs itself, ...
Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics come in a variety of shades, and it’s up to users to identify signals early on and avoid unsolicited content.
Here’s a look at some spam tactics used in popular Internet spaces. Become familiar with these tactics to help identify them and avoid them whenever possible.
Spam on Social Media
A lot of the time, spam on social media is just bad social med...
For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.
"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year."
Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.
On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!
Email, cell phones, Facebook and now Twitter all have something in common: they are being used by fraudsters for phishing attacks. If you are a Twitter subscriber you should be aware of these recent phishing efforts and how to protect yourself. You may even have received a warning from Twitter in the past few days.
Here's the short and sweet (if I were really good at Twittering, I'd write this entry in 140 character segments but I'll spare you in the interest of getting you the facts):
Chris Pirillo broke the story on January 3rd: "Phishing Scam Spreading on Twitter" just a few moments aft...
When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies.
New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack.
Types of Social Engineering Attacks
Social engineering is a way that cybercriminals use human-to-human interaction in order get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that at...