“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year.
"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,
And make sure this season is the best of your year."
Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.
Top 5 Tips To Protect Your Identity On Campus
Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus.
There are the obvious precautions to take in protecting your devices, such as never le...
Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million.
Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.
You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog:
The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox.
Regardless of where the leak originated, this is something we see all too often in the tech and busine...
With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts.
Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for. However, after a few privacy mishaps last year, such as the iCloud photo breach, an iCloud password vulnerability, and the more recent keyraider malware, Apple took notice and significantly upped their security game.
Private Means Private!
iOS 9 will not tie any usage data to an Apple ID or any other Apple service. The data is now completely anonymized, and Apple states that they w...
Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Fraudulent emails are crafted to appear legitimate, such as messages from your bank or another trusted source. They request personal information, which criminals then use for identity theft.
So what should you do if you find yourself a victim of an e...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...