There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information.
VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi.
The cybersecurity landscape is constantly evolving with new threats and never-before-seen vulnerabilities being discovered by security experts and, just as likely, exploited by cybercriminals at a fast pace. Breaking news alerts of widespread data breaches or high-profile hacks serve as reminders of the need for security online, but the flood of information can also be overwhelming. Let this cut through the clutter - Here are 10 facts you need to know about today's cybersecurity landscape:
1: Cybercriminals are using more zero-day vulnerabilities than ever before.
A new zero-day vuln...
We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year.
“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of phony travel booking websites is growing because they’re so successful at scamming consumers. Learn what to do so you don’t take a quick trip to Fraudville instead of your dream destination.
When you’re using the Internet, your Internet security suite can only go so far to protect you from potential dangers like spyware, ransomware and malware. You have to do some of the work yourself, because there are some threats that no Internet security suite can protect you against.
Social engineering is a good example of this. Social engineering is a technique that cybercriminals use, which involves human-to-human interaction in order to get the user to divulge information. Based on exploiting human nature and emotional reactions, there are many ways that attackers can try to trick y...
Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online.
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.
As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a screeching halt in the event that your personally data is compromised while traveling.
Vacations can often put your personal information at risk, due to careless missteps in how you go about preparing to leave, how you communicate while on vacation, and what you share on social media.
Here are seven ways to ensure your data stays safe wh...
Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet.
Don’t cancel your travel plans just yet. Here are eight cyber security tips for business travelers that are also great tips for anyone planning a holiday abroad:
1. Lock Devices Down
Most smartphones, laptops, and tablets come equipped with security settin...
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe.
How Do Biometrics Work?
If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to track people online. In some instances, this can be used to upsell services purchased through a mobile app, ride sharing “surge pricing” for example. How else can this be used? Here’s what you need to know about the privacy and security issues raised.
What is the Battery Status API
The Battery Status API was introduced in HTML5, and this was intended to give site owners information so th...
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can we possibly know? A Symantec security expert recently demonstrated just what a motivated hacker can do to undermine the election by hacking an electronic voting machine.
Can Hackers Hack the Election?
At the Black Hat convention this year, Symantec’s Brian Varner demonstrated a security flaw in an electronic voting machine and the smart card a voter would use to place their vote. Using...
Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experienced a monetary loss of $1 or more. Half of all victims resolved the issue within a day, but nearly one-third (29 percent) had to spend a month or more getting their life back on track. While identity theft gets a lot of the press, there are other forms of fraud out there, both on the Internet and off. The good news is that there are a my...
An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the
980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses.
2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question.
As we look back at 2016 here are some of the most impactful data breaches that shook the world.
117 Million Lin...
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job.
The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. One can’t assume your phone and the information it stores is safe from the malicious intentions of the human mind.
Data Privacy Day (DPD), is an international effort held annually on January 28 in order to hel...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Celebrating life’s milestone events is something we cherish. Births, weddings, and anniversaries. Even a death, although sad, can be a reason to celebrate the life of a loved one. And in most cases, as we share news of these milestones with friends, family, or our larger social networks, we never stop to consider that positive information could be used in a negative way. But it could.
There are multiple “layers” to the Internet that you may not be aware of. The first, or top layer is called the surface web, and it is the part of the web that is crawled by search engines. That’s the part that you can see, it’s where Facebook, YouTube, Twitter and everything else under the search engine sun lives.
The second layer of the Web is called the deep web. Think of it as an ocean- on the top you have the boats dragging their nets across the surface. The boats are the web crawlers for search engines, and the “nets” catch what is on the surface for indexing by the search engine. ...
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all of these need to take an interest in cybersecurity or pay the price. It’s a matter or success, but also a matter of national security. Those working in critical infrastructure have a special obligation to make sure that they’re securing the workplace. Here are some of the best ways to create a culture of cybersecurity where you work.
It All Starts With Education and Training
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Happy Thanksgiving from Norton!
As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport.
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you need to know to protect yourself from this email password stealing scam.
Who is affected?
Symantec researchers have found this scam largely targets Gmail, Hotmail, and Yahoo Mail users. However, everyone with an email account should be aware of how this scam works to avoid falling victim.
See how the scam works. In just a few quick steps, cybercriminals trick victims into disclosing email ...
Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds. But did you ever stop to wonder what happens to your searches?
Believe it or not, accessing the deep web is easier than you think. In fact, you’ve probably already done it. The media hasn’t done a great job of differentiating what’s considered deep web, and what is actually dark web—two similar titles for two very different things.
What Is the Deep Web?
The deep web is just what it sounds like: below the surface and not completely dark.
Search engines like Google, Yahoo, and Bing are able to search and index websites because of links; they use links to rank search results according to things like relevancy, inbound links, and keywords. But that’s w...
Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors encountered on a computer. However, all of them share a common goal, which is to compromise the safety of your devices. Symptoms of malware may appear obvious or discrete; knowing how to detect these dangerous intrusions will help you determine how to go about fixing the problem should it ever occur.
Malware is short for malicious software and refers to pro...
You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber criminals. But that doesn’t mean you know how a firewall actually works, does it?
Don’t worry—the truth is that most people don’t how a firewall works; they just expect it to do its job. But it’s actually a lot simpler than you might think. Once you learn a little more about firewalls, you might feel more confident about installing one on your home computer, if you haven’t already. If you’re already using a firewall to prevent cyber attacks, perhaps learning more about how it works will improve ...
Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, there’s malware on your computer anyway. The fight against malware is a complicated arms race of sorts. Here’s how it works.
The Four Components of the Malware Arms Race
There are three main players in the malware arms race:
The malware coders are, unfortunately, generally the winners of the arms race. They write mali...
If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software in action. Here’s what you need to know about this emerging technology.
How Facial Recognition Software Works
You’ve never given much thought to how you recognize a face, and probably even less to how a computer would do it. Still, it’s not news that human faces have certain qualities you recognize. The spacing of eyes on a face, the position and width of a nose, the shape of a hairline and ...
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.
How Do Mobile Devices Connect to the Internet?
Let’s break down the three different ways your mobile device can connect to the Internet, and...
As summer arrives, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world, often using unsafe public Wi-Fi.
Freezing your credit report is sometimes very necessary. It prevents credit thieves from opening new cards and other accounts in your name, and is often recommended when you’re dealing with the ramifications of identity theft.
What Is a Credit Freeze?
A credit freeze, also known as a security freeze, gives you the chance to “lock” your data at major credit bureaus. Doing this also makes it impossible for identity thieves to use your name on anything linked to your credit report. You will receive a password or personal identification number to use for temporarily lifting or removing the f...
According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online.
To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, and your personal property at risk.
There’s no reason to assume the worst when you go on vacation, but you can greatly reduce your chances of a security breach by preparing your smartphone or tablet ahead of time and remaining vigilant while on your trip. Here’s how to prepare a smartphone or tablet before you go on vacation.
Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more concerns than just basic financial ones. When you see the full list of cybercrimes out there, you might be tempted to stop using the Internet entirely. However, such drastic measures are not necessary. All you need to do to protect yourself is take some basic precautions and know who to contact when you see others engaged in criminal activities online.
What Is Cybercrime?
Cybercrime is any ...
Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.
With the advent of easy digital photography, however, connecting extra information to the photos became easy as well. This information, known as “metadata,” might include items like the GPS coordinates of the photo’s location, the date and time it was taken, the camera type and shutter settings, and the software used to edit the photo.
Many digital photographers don’t realize that their photos might carry this...
Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you could be letting anyone with a wireless-enabled device gain access to your home network. That means you’re opening up your emails, banking information, and maybe even details of your smart home’s daily schedule to criminals.
Basic Wireless Security
Every router should have a password to keep out the bad guys. Some routers come with default passwords, but you should change these during setup. C...
Congratulations on your new device! You’re likely caught up in the fun of having a new gadget, and probably shopping for a shiny (or sparkly) new case. While a case protects your device from nature and clumsy hands, it doesn’t make your phone absolutely safe. Why? Because it doesn’t protect what matters most—your information.
Think about all that you do on your devices—sharing precious photos, ordering your favorite latte, and shopping. With the rise of cybercrime and the high costs associated with it, it’s even more important that you learn how to protect what matters most—the personal i...
As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.
If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard.
According to a 2015 survey 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online.
This onslaught of hateful messag...
There are more mobile devices on our planet than there are people. It is no surprise that our daily and digital lives have become a seamless unit of existence. Just like your real life, your digital life comes with its own ups and downs. The upside of your digital life is that you can start fresh with a new device and clean up any old hang-ups that can compromise you.
We, at Norton know everything there is to know about the safety of your digital life. We are determined to stay one step ahead of cyber criminals and keep our customers safe.
If you have a new device or PC do not miss our g...
Last year, the Norton team brought you a new look into cybercrime via the documentary “In Search Of The Most Dangerous Town On The Internet.” Through this film we investigated the Romanian town Râmnicu Vâlcea, also known as "Hackerville." While there, we spoke with various types of hackers and about their motives, and how they do what they do.
In the second installment of our series, we explore the far corners of the globe, in search of bulletproof hosting, which is how cybercriminals execute their attacks. Watch the trailer today, and tune into Most...
Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a computer’s hard drive. But what really happens to all that data? Where does it go, and is it really gone forever?
Some people will be relieved to know that, most of the time, deleted files are not permanently gone. Many of us have at one time or another accidently deleted items we did not mean to; in this case the prospect of bringing those files back from the dead is usually good news.
The bad news...
Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...
It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.
Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablet...