• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos3 Stats

The 5 Stages of Phone Loss Grief

It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat. After what seems like an eternity, you come to the crushing realization that you have lost one of the most valuable material possessions...
Read More
Kudos1 Stats

7 Dos and Don’ts of Secure Online Tax Filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it. As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
Read More
Kudos1 Stats

Data Privacy Day 2016: Ten Ways to Keep Your Data Private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. One can’t assume your phone and the information it stores is safe from the malicious intentions of the human mind. Data Privacy Day (DPD), is an international effort held annually on January 28 in order to hel...
Read More
Kudos1 Stats

Netiquette For Parents

No one said parenting is easy. Especially when your children are doing things in the cyber world that you as a child never imagined. With the wealth of information and non-traditional methods of making friends and hanging out, our children are no doubt having a good time, thanks to the advancements in technology. But that still doesn’t mean they have the liberty to do as they please at the expense of others. One of the most important aspects of parenting is setting a good example. Your kids will closely watch your online manners and etiquette. You need to be aware and educated about net...
Read More
Kudos3 Stats

Cyber Safety for Women

An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
Read More
Kudos2 Stats

What is Cyberbullying?

Online socializing has both good and bad sides to it. While it has opened a whole new dimension of ways to communicate and has added convenience to our lifestyles, it unfortunately has some unpleasant effects too.

Read More
Kudos2 Stats

How to Use Your New PC or Mobile Device Safely Online

There are more mobile devices on our planet than there are people. It is no surprise that our daily and digital lives have become a seamless unit of existence. Just like your real life, your digital life comes with its own ups and downs. The upside of your digital life is that you can start fresh with a new device and clean up any old hang-ups that can compromise you. We, at Norton know everything there is to know about the safety of your digital life. We are determined to stay one step ahead of cyber criminals and keep our customers safe. If you have a new device or PC do not miss our g...
Read More
Kudos2 Stats

How To Talk to Your Kids About Cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard. According to a 2015 survey 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online. This onslaught of hateful messag...
Read More
Kudos3 Stats

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.   Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablet...
Read More
Kudos4 Stats

Data Breaches That Made Headlines in 2016

980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses. 2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question. As we look back at 2016 here are some of the most impactful data breaches that shook the world. 117 Million Lin...
Read More
Kudos1 Stats

New Year, Renewed Readiness

With a new year comes renewed excitement, refreshed minds and revitalized focus for all that lies ahead. The same is unfortunately true for the cybercriminals we are up against.

Read More
Kudos3 Stats

The Dos and Don’ts of Using Public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.

Read More
Kudos3 Stats

5 Tips to Protect Yourself from Online Travel Booking Scams

Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of phony travel booking websites is growing because they’re so successful at scamming consumers. Learn what to do so you don’t take a quick trip to Fraudville instead of your dream destination.

Read More
Kudos2 Stats

4 Steps to Make Your Smart Home More Security Smart

“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority. 

Read More
Kudos2 Stats

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps open in Arizona and Florida. If you decide to go big, just remember to watch for scams when buying merchandise or tickets online — or you might find yourself striking out on Internet security.

Read More
Kudos4 Stats

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not unusual for otherwise dedicated employees to schedule in some pleasure along with business. However, March Madness can cost workers and small business owners much more than productivity as cybercriminals target unsuspecting fans with malware.

Read More
Kudos3 Stats

What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi

If you’ve ever wondered if it’s safe to use public Wi-Fi, you are not alone. In fact, according to the Norton Cybersecurity Insights Report, 6 in 10 consumers believe using public Wi-Fi is riskier than using a public restroom. And it is. Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk. That’s why a virtual private network, better known as a VPN, is a must for anyone worried about online security and privacy. 

Read More
Kudos4 Stats

Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security

Vacation may be a time for rest and relaxation, but your mobile devices likely won’t be getting a break. Now that smartphones and tablets are part of our daily lives, we spend more time than ever staying connected, even while on vacation. Just think of all the selfies you’ll be taking and updates you’ll be posting to your social networks! But, while sharing your vacation moments will be a fun way to capture your R&R, your fun vacation could turn into a bad situation if you choose to use your mobile devices on free public Wi-Fi during your trip. Learn how to be aware of using your mobile devices on public Wi-Fi at key points on your vacation.

Read More
Kudos1 Stats

Don’t Let Social Network Sharing Ruin Your Celebrations

Celebrating life’s milestone events is something we cherish. Births, weddings, and anniversaries. Even a death, although sad, can be a reason to celebrate the life of a loved one. And in most cases, as we share news of these milestones with friends, family, or our larger social networks, we never stop to consider that positive information could be used in a negative way. But it could.

Read More
Kudos3 Stats

How to Avoid Public Wi-Fi Woes on a Business Trip

As summer arrives, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world, often using unsafe public Wi-Fi.

Read More
Kudos2 Stats

What Is a No-Log VPN Network?

Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider.

Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos4 Stats

How to Securely Set Up Your Home Wi-Fi Router

Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you could be letting anyone with a wireless-enabled device gain access to your home network. That means you’re opening up your emails, banking information, and maybe even details of your smart home’s daily schedule to criminals.  Basic Wireless Security Every router should have a password to keep out the bad guys. Some routers come with default passwords, but you should change these during setup. C...
Read More
Kudos2 Stats

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls. 

Read More
Kudos1 Stats

How a VPN Can Help Hide Your Search History

Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds. But did you ever stop to wonder what happens to your searches?

Read More
Kudos1 Stats

The 12 Days of Norton

"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year."

Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.

Read More
Kudos2 Stats

Holiday Travelers' Tips for Device Security in Airports

As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport. 

Read More
Kudos2 Stats

12 Days of Norton Tips

We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year.

Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos4 Stats

Cyber Security Best Practices for Employees

Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the

Read More
Kudos3 Stats

What is The Deep Dark Web: #30SecTech

There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything else under the search engine sun. This is known as the “surface web.”

Read More
Kudos1 Stats

PC or Mac: Which Is More Resistant to Cyber Threats?

Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has been considerable debate in the tech arena regarding the security of one machine over the other. Are PCs more prone to cyber attacks? Is a Macbook really less vulnerable to online threats? The debate wages on. For a long time Mac users enjoyed a period of peace—they felt impervious to threats, only to realize years later that the sophisticated hacker would eventually evolve to this platform...
Read More
Kudos0

Telltale Signs an App Is Violating Your Privacy

Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of paranoia goes a long way. Malicious apps can steal your personal information, including sensitive financial information that can then be used to steal your identity. A lot of malware ends up on your phone due to malicious apps. So what are signs that you might already have a malicious app on your phone? Slow Internet Connections A slow Internet connection doesn’t always mean malware, but it...
Read More
Kudos1 Stats

What Personal Information Should You Safeguard?

Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you. Let’s review this information to help you protect yourself as much as possible: Low Sensitivity Among the information considered “low risk” in regard to personal information sensitivity is your full name, address, and phone number. Medium Sensitivity Information regarded as “medium” in terms of sensitivity includes your date of birth, place of bi...
Read More
Kudos0

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you login to your phone using your fingerprint. As with any emerging technology, the first question you should ask is if they are safe. How Do Biometrics Work? If you’ve ever put your fingerprint into an device, you have a vague idea of how biometrics work. Basically, you record your biometric information, in this case a fingerprint. The information is then stored, to be accessed later for compa...
Read More
Kudos3 Stats

8 Cyber Security Tips for Business Travelers

Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet. Don’t cancel your travel plans just yet. Here are eight cyber security tips for business travelers that are also great tips for anyone planning a holiday abroad: 1. Lock Devices Down Most smartphones, laptops, and tablets come equipped with security settin...
Read More
Kudos2 Stats

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats. Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same pers...
Read More
Kudos2 Stats

Technology Usage and the Physical Effects on Your Body

Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the body, including a condition known as “text neck.” Extra strain on the muscles from sitting and reading various devices for long periods of time makes tissue sore and inflamed, and can potentially pull your spine out of alignment. Health experts call this damaging posture “forward head posture.” “Neck muscles, in their proper position, are designed to support the weight of your head, about 10 to ...
Read More
Kudos1 Stats

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experienced a monetary loss of $1 or more. Half of all victims resolved the issue within a day, but nearly one-third (29 percent) had to spend a month or more getting their life back on track. While identity theft gets a lot of the press, there are other forms of fraud out there, both on the Internet and off. The good news is that there are a my...
Read More
Kudos2 Stats

What Is a DDoS Attack? - #30SecTech by Norton

A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. Most times that you hear about a website being “brought down by hackers” what that means is that it’s become a victim of a DDoS. 

Read More
Kudos0

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s job hunt often begins and ends online.

Read More
Kudos0

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them. Meet the Cookie A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then s...
Read More
Kudos2 Stats

Good Cyber Hygiene

Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices. Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine. But what does that have to do with your computer? Cyber h...
Read More
Kudos1 Stats

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You may never see your phone again, but you’ll know that your personal information is safe from those who would abuse it. Let the Right People Know The first thing to do is to let the authorities know your mobile device was stolen. File a report with the police—not only is this helpful for insurance purposes but it also increases recovery ch...
Read More
Kudos1 Stats

The Risks of Third Party App Stores

Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore yourself, at risk. What Third-Party App Stores Do Dangerous third-party app stores work via malicious advertising or even code. The ads or codes are “injected” into popular apps users purchase through these stores instead of legitimate options. While not all third-party apps are “bad,” many stores bait users by offering popular apps for much cheaper prices, and subsequently put user privacy ver...
Read More
Kudos1 Stats

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that 90 percent of Android devices are exposed to at least one critical vulnerability.  The threat model was constructed using three common attack vectors: installation attack (malicious codes installed through app download); dynamic code loading (an existing app downloads new malicious codes); and injection (an attacker injects malicious code...
Read More
Kudos0

What To Do When You Fall For An Email Scam

Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more. Fraudulent emails are crafted to appear legitimate, such as messages from your bank or another trusted source. They request personal information, which criminals then use for identity theft. So what should you do if you find yourself a victim of an e...
Read More
Kudos0

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get paid to complete surveys, and earn rewards or special discounts from popular brands. Some surveys aren’t paid at all, offering consumers little more than the opportunity to participate in the development process of a product or service. There’s been a lot of hype about people allegedly making a living off of these online surveys, causing...
Read More
Kudos1 Stats

What is a Botnet?

The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions. A botnet is nothing more than a string of connected computers coordinated together to perform a task. That can be maintaining a chatroom, or it can be taking control of your computer. Botnets are just one of the many perils out there on the Internet. Here’s how they work and how you can protect yourself. Botnets are the workhorses of the Int...
Read More