Mobile technologies sure-to-trend in 2014 include "smart" connected devices and wearable gadgets. With 2.88 billion people reached by the #CES2014 hashtag, according to the Consumer Electronics Association, this new tech is growing in popularity in no time. Watch the best-of from Norton at CES.
Did you miss the Norton Truck interactive mobile privacy experience at CES? You can still try Norton Mobile Security for free, here: https://mobilesecurity.norton.com/
Read on for more quick tips to protect your mobile privacy:
Protect your private info: Did you know? 1-in-4 smartphone user...
The rise of the smartphone has brought countless technological benefits that make our daily lives easier in so many ways, and one of the biggest has been the freedom of mobile banking. Gone are the days of waiting in a busy branch on a Saturday afternoon to transfer money into your savings account, or calling an automated number to check your balance.
But having your bank accounts within such close reach does bring its dangers, and it shouldn’t simply be assumed that logging in and doing your banking can now be done at any time and in any place. Here are five quick tips to keeping your mon...
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe.
How Do Biometrics Work?
If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.
How Do Mobile Devices Connect to the Internet?
Let’s break down the three different ways your mobile device can connect to the Internet, and...
Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.
Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees.
This was my first time attending this conference, and although I did my research on it, it was beyond my e...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps.
You can have the usual parent-child conversations about not chatting to strangers and not revealing too much about themselves, but sometimes the apps take matters into their own hands and give away more than they should. Check out these quick steps you can take to make socia...
Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your personal information, including sensitive financial information that can then be used to steal your identity. A lot of malware ends up on your phone due to malicious apps. So what are signs that you might already have a malicious app on your phone?
Slow Internet Connections
A slow Internet connection doesn’t always mean malware, but it...