“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.
As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
Despite controversial beginnings, many school districts across the United States are embracing BYOD—bring your own device—in the classroom by expanding curriculum to include student owned devices. With this trend gaining momentum, some districts are starting to run pilot programs to explore the benefits of bringing mobility to classrooms through BYOD. Rather than fighting against change, forward thinking school districts are moving into 21st century learning environments because they recognize the advantages of incorporating tehcnology and learning applications into the classroom to bet...
Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experienced a monetary loss of $1 or more. Half of all victims resolved the issue within a day, but nearly one-third (29 percent) had to spend a month or more getting their life back on track. While identity theft gets a lot of the press, there are other forms of fraud out there, both on the Internet and off. The good news is that there are a my...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, there’s malware on your computer anyway. The fight against malware is a complicated arms race of sorts. Here’s how it works.
The Four Components of the Malware Arms Race
There are three main players in the malware arms race:
The malware coders are, unfortunately, generally the winners of the arms race. They write mali...
If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your digital and personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software.
If your goal is to protect your devices and your identity, you can’t afford to take chances. There are two things you can do to avoid purchasing fraudulent security and antivirus software. First, do your research, educate yourself, and be cautious. Second, purchas...
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.
If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Experiencing and using the latest innovations in technology is always exciting—and wearable devices are no exception. Driven by technological advances, social factors, and the Internet of Things, consumers everywhere are enthusiastically embracing wearable technology. As a result, being connected to the Internet is becoming a part of daily life, creating a reality where the physical and digital worlds intersect and overlap at an unprecedented rate, often leaving security behind.
Physical-Digital Innovations Allow Us To Experience The World In Unprecedented Ways
Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.
With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped your list of things to buy. As you search with excitement to find the device that best fulfills your needs, the thought of installing security software on them might not be at the forefront of your mind. However, considering that an alarming 63 percent of mobile device owners fell victim to cybercrime in 2013, it’s important to take steps to keep the information on your mobile devices secure.
Past events continue to substantiate that securing all connected devices is the smartest and easiest ...
Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them.
Meet the Cookie
A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Fraudulent emails are crafted to appear legitimate, such as messages from your bank or another trusted source. They request personal information, which criminals then use for identity theft.
So what should you do if you find yourself a victim of an e...