Kudos0

Types of Common Mobile Threats and What They Can Do to Your Phone

If you know anything about online security, you know that your phone is even more susceptible to malware than your computer. It gets worse. Once your phone is hacked, your computer can easily be next. That’s because your total online security is only as secure as the weakest link in the chain.

More
Kudos2 Stats

What Are Malicious Websites and Drive by Downloads?

Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised by doing nothing more than visiting a website.

More
Kudos0

What Is Spear Phishing?

Spear phishing isn’t what you do when you’re on vacation in Hawaii. It’s a targeted attack on your personal information. An updated version of the old trick “phishing,” where scam artists simply ask you for your password or other private information, spear phishing takes this trick to the next level, using social engineering. Before you respond to that email asking for you to verify your address or other personal information, read this article to protect yourself against spear phishing.

More
Kudos0

Terrifying Threats That Will Try to Trick Instead of Treat You This Halloween

Last year was a banner year for cybercriminals and hackers, as there were increases in some of the most dangerous threats on the Internet landscape. Over 317 million new pieces of malware was created in 2014, which equals about 1 million new threats being released on a daily basis. If you’re not scared stiff yet, continue reading.

More
Kudos2 Stats

The Facts About Jailbreaking iOS Devices

While jailbreaking an iPhone seems to open up the device to limitless possibilities, it is actually, in fact, a large security risk for your phone. Jailbreaking can allow users to bypass many iOS restrictions they might consider limiting, such as being only able to download apps from the Apple iOS App Store and other types of personal customizations of the device. However, this also means that cybercriminals have access to a much larger security hole to attack the device. 

More
Kudos0

Your Evolving Digital Life With the Internet of Things

The hottest new trend on the Internet isn’t a new social network or app. It’s things. Dubbed “The Internet of Things”  it refers to any object you can connect to with the Internet. These "things" include an array of devices and even systems. Either way, the Internet of Things promises to connect more devices than ever before.

More
Kudos0

8 Elements to Help You Become a Great Digital Citizen

"Digital Citizenship" is the umbrella term used to describe the expectations of a digital citizen. If you use the Internet on a regular basis, you are a digital citizen! Just like being a citizen in the physical world, a lot of the same rules apply when you are a citizen of the digital world.

Here are eight elements that embody what it takes to be a good digital citizen:

Digital commerce:

More
Kudos1 Stats

How Do Businesses Get Hacked?

While organizations may have some of the best security in the world protecting their information, there are people who are in charge of creating and handling that information.. Because people’s brains are impossible to secure via software, social engineering plays a key role in allowing cybercriminals to bypass computers and security software to commit acts of cyber espionage.

More
Kudos4 Stats

7 Of The Most Important Cyber Security Topics You Should Learn About


October is National Cyber Security Awareness Month, and we love participating, as it is a way to help further educate everyone about staying safe on the Internet. To kick off the first week, we’re going to give you a crash course in basic cyber security 101. A lot of these topics will come up over the next month, so let’s make sure everyone knows what they mean.

More
Kudos0

Apple’s iOS 9 Shines The Spotlight On Security

It’s another year and another shiny new iOS for all to enjoy! Apple hits the mark on all the usual exciting, fun enhancements such as a more intelligent Siri, and those new Emojis we’ve all been waiting for.

More
Kudos4 Stats

Get Ready For Some Big Updates!

Beginning this month, we will begin automatically updating customers with a new PC client that provides the best usability, performance and protection that we offer to-date. We’re rolling these updates out to users over the next several months, however, you have an opportunity to get these features now.

More
Kudos1 Stats

Ransomware- When Cybercriminals Hold Your Computer Hostage

Ransomware is a form of malware that will lock files on a computer using encryption. Encryption converts files into another format, like a secret code and can only be decoded by a specific decryption key.

Types of Ransomware

Ransomware can present itself in two forms.

More
Kudos2 Stats

What's driving Norton Power Eraser?

Symantec Maximum Repair (SMR) is a brand new security engine that drives our new Norton Power Eraser recovery tool. It combines aggressive heuristics and advanced removal capabilities to combat the newest and toughest threats. I thought I would share with you some of the background on why we developed this new engine.

 

Why the need?

More
Kudos0

College Kit: How To Keep Devices Secure and Information Safe

College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence.

More
Kudos0

High School Kit: More Independence Online

You’re learning how to drive, looking into potential colleges, getting your first “real” girlfriend or boyfriend, going to dances, parties, making new friends and having fun!  With all of this newfound independence comes amazing new adventures and experiences in your life. It is easy to get caught up in the excitement, but, along with all of your academic studies and extra curricular activities, an education in cyber security can help keep you safe while you keep exploring.

More
Kudos0

Grade School Cyber Security Kit: Online Safety 101

The Internet can be a place of endless wonders. It’s where you learn, talk, shop, and play. Still, the Internet is just like anything else in life- there are important rules that everyone should follow in order to make sure they stay safe while online.

More
Kudos0

How Do Cybercriminals Make Money?

Since most of what we do is now online, from shopping for food to paying bills, the global economy is taking a digital shift. It’s only natural for criminals to follow suit. As criminals consider the economics of what they do, they recognize cybercrime as one of the quickest ways for them to make money. For a hacker, extortion is an easy way to monetize stolen information and provides the shortest path from cybercrime to cash.

More
Kudos4 Stats

Windows 10: New Security Features and the Role of Third Party Security

Just like everyone else, we’re excited about Windows 10 this year. We particularly look forward to new security improvements that Microsoft brings to Windows with each new release. While this may sound like a strange position for a security company to take, the reason why we welcome these improvements is that every security improvement, no matter how big or small, is bad for hackers and criminals and good for consumers.  Like the majority of customers in the market, we’re also customers of Microsoft Windows and we recognize that Microsoft Windows is an attractive target for criminals.

Even with all of the new features, Microsoft Windows’ “attack surface” continues to grow with each new release. Microsoft-developed security improvements and features can play an important role in helping to reduce the attack surface of each new Windows release.

More
Kudos5 Stats

Password Managers Are The Key To Secure Passwords

According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts.

More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies.

More
Kudos0

Is It Doing Anything?

I recently explained how the Smart Scheduler feature in Norton 360 works to stay out of your way in deciding when to run tasks. The scheduler is so effective that it's common for users to wonder if we're ever performing scans. Neil Rubenking even noted in his PC Magazine review of Norton 360 that "It's so quiet you might begin to wonder if it's doing anything at all."

More
Kudos12 Stats

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves.

More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time

More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose..

More
Kudos6 Stats

What Is a Virus #30SecTech

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.

More
Kudos2 Stats

Spring Cleaning to Secure Your Digital Life

Tidy Up Your Digital Life

It’s time to delete those digital dust bunnies – that includes programs you don’t use and unimportant files littering your desktop. Here are a few quick tips to get started:

More
Kudos2 Stats

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts.

More
Kudos3 Stats

What is Social Engineering?

We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack.

More
Kudos2 Stats

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips:

Online Security at Events

More
Kudos0

Digital Security Tips for Connected Fans

Mobile devices are central to the way people experience concerts, events and festivals. From snapping photos, sharing via social networks, to interactive event apps that enhance the experience. Yet, as the role of smartphones expands, so do the security risks. If you're a connected fan, practice good online security habits with these tips:

Online Security at Events

More
Kudos3 Stats

How do Zero-Day Vulnerabilities work: #30SecTech

What is a software vulnerability?

In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that can be exploited by cybercriminals.

Why do vulnerabilities pose security risks?

More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy.

More
Kudos2 Stats

What To Do In The Event Of A Bank Breach



You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now.

More