• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos2 Stats

My Account May Have Been Hacked—What To Do Now?

You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox. Regardless of where the leak originated, this is something we see all too often in the tech and busine...
Read More
Kudos1 Stats

The Connected Home- Just How Safe Is Convenience?

The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.

Read More
Kudos0

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely.

Read More
Kudos0

Tech Industry Leaders Join Forces In ‘Operation SMN’ to Reduce Malware Attacks on the Internet Landscape

For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.

Read More
Kudos2 Stats

Traveling? Don’t Let Your Mobile Data Stray

Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data. 

Read More
Kudos0

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device?

Read More
Kudos0

Four Mobile Threats that May Surprise You

Viruses and malware isn't just for computers anymore. What is your business doing to keep your mobile devices safe from these threats?

Read More
Kudos0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?

Read More
Kudos0

Securing Employee Technology, Step by Step

With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.

Read More
Kudos0

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.

Happy Halloween from the Symantec Storytelling team!

Read More
Kudos0

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught.

Read More
Kudos5 Stats

The Importance of General Software Updates and Patches

Software updates can seem like an annoyance, but they are actually critical to the protection of your system.

Read More
Kudos0

The Future of Security on the iOS Platform

There have been a few high profile news stories about iOS app vulnerabilities lately. Although only effecting niche markets, what do these attacks mean for the future of iOS security?

Read More
Kudos0

POS Malware Data Breaches and Why They Keep Happening

In recent news, more and more reports have surfaced about data breaches impacting millions of consumers. Many of these data breaches involve a business’s point of sale. The main objective of point of sale (POS) breaches is to steal your 16-digit credit card numbers. Sixty percent of Point of Sale (POS) transactions are performed via credit card, which means big business for cybercriminals (individual credit cards can be sold for up to 100 dollars apiece). The industries most affected by POS data breaches are usually restaurants, retail stores, grocery stores and hotels. The mainstream me...
Read More
Kudos0

What’s the Safest Way To Pay This Holiday Season?

There’s already enough to stress about with the upcoming holiday season- finding the perfect present for everyone on your list, making holiday treats for friends and neighbors, and of course, sending out all of the holiday greeting cards. One less thing that needs to be added to that list is the stress of a credit card data breach. This holiday season, we’re examining all of the ways to pay, on and offline, and the safest way to take care of all of your holiday purchasing needs. Credit Cards and the Recent POS Breaches The topic of data breaches and identity theft has been in the med...
Read More
Kudos1 Stats

Happy Thanksgiving!

Read More
Kudos1 Stats

The 12 Scams of Holidays Past

On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!

Read More
Kudos3 Stats

New Years Security Resolutions

While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life. Software Updates- Install Early, Install Often Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
Read More
Kudos1 Stats

New Year’s Resolutions – There’s An App For That!

As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful t...
Read More
Kudos4 Stats

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.

Read More
Kudos2 Stats

Securing Your Game Console and Gaming Account

Today’s gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are resistant to malware for the time being, there are still ways that cybercriminals will try to gain access to your valuable gaming accounts. In addition to phishing attempts on gaming accounts, online gameplay can be affected by hackers via Distributed Denial of Service (DDoS) attacks. These attacks do not involve the users’ consoles directly; rather hackers intentionally flood the gaming company...
Read More
Kudos2 Stats

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future. Corporations and even smaller businesses are an extremely attractive target to cybercriminals, simply due to the large payday of data that can be stolen.  What Can Cybercriminals Do With My Stolen Data? The main...
Read More
Kudos4 Stats

Norton's Support Commitment And Our Virus Protection Promise

Norton is the leader in digital solutions and we have the best in class digital security solutions available on the market today that’s backed by the largest threat intelligence database in the world. Furthermore, you’re covered by Norton’s Virus Protection Promise.  Should you run into any problems, Norton Security is supported by a team of passionate and empowered security experts that work around the clock to provide you with support whenever you need it most. We understand that getting a virus on your system would be a technical nightmare. Navigating through spam emails, pop-ups...
Read More
Kudos4 Stats

Data Privacy Day 2015

What is Data Privacy Day? Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint. DpD is a series of events online and offline intended to bring awareness of the importance of privacy and how to protect it. Why is Privacy Important? There are many reasons why maintaining your privacy online is important. Protecting your privacy helps impede the theft of financial information and identities. Howeve...
Read More
Kudos1 Stats

Online Dating and Protecting Your Privacy

This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers. What are the risks? As with anything you post online, it’s out there for everyone to see, so you will want to be careful with what identifiable information you u...
Read More
Kudos3 Stats

Are Your Devices Listening In On Your Conversations?

Is it time to start speaking in code in your living room? Recent tech buzz has fingered voice control on your smart TV as a security risk, listening in on your conversations in order to utilize voice commands, and then sending that information out to third parties. The thought of “always listening” devices using voice commands can seem like a scary thing; however, it’s not as scary as it sounds, just yet. Still it’s important to be aware of potential risks as the growth of speech-to-text technology will more frequently become integrated into new devices entering the market. Protect You...
Read More
Kudos2 Stats

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS messaging over the last two years. Cyber security experts at Symantec have been tracking Carbanak for some time now. What can cybercriminals do with my data in the event of a banking or financial institution breach? Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank a...
Read More
Kudos2 Stats

What Is A Man In The Middle Attack?

In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data...
Read More
Kudos2 Stats

Norton Mobile Security Receives AV-TEST Innovation Award

Norton was presented with the Innovation Award for Norton Mobile Security’s App Advisor for Google Play from AV-TEST during Mobile World Congress in Barcelona, Spain, because of the unique innovation that has helped provide the next level of mobile protection for the changing digital security landscape. As smartphones continue to evolve into being used as personal computers, more and more sensitive information gets stored on the device. We shop, we do our finances, we connect to other devices, communicate, and even entertain ourselves.. What mobile users should be more aware of is that s...
Read More
Kudos2 Stats

Data Privacy and Ridesharing Apps

In busy towns and congested cities, ridesharing apps are quickly becoming all the rage. They’re a new and interesting marriage of technology and commuting that helps us keep up with this “always on” lifestyle. However, they’re also kicking up quite the controversy over how companies handle our real-time location data and overall privacy. What is ridesharing? Uncommonly referred to as “real-time ridesharing,” these new mobile apps are taking the local markets by storm. They allow a user to request an almost instant ride to wherever they need to go with just the push of a button.  In a...
Read More
Kudos3 Stats

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cybercriminals use to try to get your information. Exploit Kit Exploit kits are malicious toolkits that attackers use to search for software vulnerabilities on a target’s computer. The kits come with prewritten code that will search for the vulnerabilities, and once it is found, the kit can then inject malware into the computer through tha...
Read More
Kudos4 Stats

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software and apps- there is always some trade-off. Frequently, free software companies will partner with other companies and bundle additional software within the download. Mostly, these programs are bundled with toolbar add-ons, however, hidden within these add-ons can be spyware, ad libraries, and even browser hijackers. While this is not ma...
Read More
Kudos3 Stats

What is Social Engineering?

We talk about software vulnerabilities a lot, and the human versions of those are our emotions. When people are faced with frightening scenarios, their first impulse is to act first and think later. This is the exact “vulnerability” that social engineers depend upon for a successful attack. Types of Social Engineering Attacks Social engineering is a way that cybercriminals use human-to-human interaction in order get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that at...
Read More
Kudos1 Stats

Spring Break and Mobile Device Safety

Technology can add many conveniences to travel: you can check into your flight via smartphone, make last-minute reservations for restaurants or local attractions, take hundreds of photos to commemorate your trip, and even get a little help navigating an unfamiliar city. However, when packing and planning for a vacation, how often do you think of mobile device security? Between picking out the perfect bikini, and loading up all of your ski gear, mobile security is probably the last thing on your mind, but it should be the first. We live so much of our lives through our devices these days; ...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Read More
Kudos4 Stats

SSL Certificates: What Consumers Need to Know

Guest post by Jeff Barto, Trust Strategist, Evangelist & Website Security Advocate for Symantec In 1994, the first online purchase crossed the World Wide Web: a large pepperoni pizza with mushrooms and extra cheese from Pizza Hut. Over the next 20 years, e-commerce has exploded into a bustling economy, exceeding $1.2 trillion in sales in 2013. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates- otherwi...
Read More
Kudos0

The New Norton Family eBook

We live in a world where we’re constantly connected, including our kids. While the Internet can be an invaluable resource for your child in many ways, it’s nearly impossible to be aware of your child’s online activities all of the time. Of course, you want to educate your child and help them learn about safety and responsibility online, but in today’s busy world, it isn’t always easy to find the time Kids these days may seem more comfortable with the usage of technology, maybe even more so than you, however, we forget that they’re still learning and may not be aware of the security risks ...
Read More
Kudos1 Stats

Take The World Backup Day Pledge!

Spring has finally sprung, and it’s that time of year where a lot of us clean, organize, and simplify our lives. What a lot of people don’t realize is the importance of applying those principles to our digital data as well. We collect, organize and store the things in our lives that are important to us (just ask anyone with a garage).Many of those things packed away in those special storage spaces would be devastating to lose.. But have you ever thought that way about what is on your tablets, computers and mobile phones? Right now, most folks have hundreds of phot...
Read More
Kudos5 Stats

What is the Difference Between Black, White and Grey Hat Hackers?

Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission.  Many companies and government agencies actually employ hackers to help them secure their systems. Hackers ar...
Read More
Kudos1 Stats

What Happens When Your Identity Is Stolen?

The IRS has announced that it will be notifying taxpayers after third parties gained unauthorized access to information on about 100,000 accounts through the “Get Transcript” online application. You can view more about the breach via a statement on the IRS’s website. More About Identity Theft: According to the Federal Trade Commission’s 2014 Consumer Sentinel Network Data Book, identity theft once again tops consumer complaint categories in 2014. Identity theft can be committed in many ways: from non-technical methods such as stealing purses or “dumpster diving” for documents that have ...
Read More
Kudos2 Stats

What is Cyber Espionage?

When you think of espionage, characters like James Bond might come to mind- having to travel halfway around the world, pretending to be someone they’re not, infiltrating organizations and stealing secrets. Even though James Bond is just a fictional character, old school spies like that do exist. However, with the advancement of all of our data becoming digitized, we’re quickly becoming introduced to the new school version of spies- cyber spies. New school espionage simplifies the spying process extremely. Companies and institutions store almost an overabundance of data in their systems. I...
Read More
Kudos2 Stats

Data Breaches Aren't Going Away- What You Need To Know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks are becoming the new wave of crime. Corporations and even small businesses are extremely attractive targets to cybercriminals, simply due to the large payday of data that can be nabbed in one fell swoop. What is a data breach and how and why do they happen? The main reason that cybercriminals are stealing personal information is for us...
Read More
Kudos5 Stats

Password Managers Are The Key To Secure Passwords

According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts. Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not  a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
Read More
Kudos1 Stats

A New Look into Cybercrime- “In Search Of The Most Dangerous Town On The Internet”

Cybercrime is on the rise, and although it may seem like it is faceless crime, it is not. “In Search Of The Most Dangerous Town On The Internet” takes a deep, personal look into the real world of cybercrime. The Romanian town Râmnicu Vâlcea, also known as, "Hackerville", is home to many notorious scammers and convicted blackhat hackers, such as Guccifer, who was responsible for the Hillary Clinton email hack. Through their own words, they discuss their methods for deploying malicious worms, viruses, social engineering scams, stealing identities, and the surprising...
Read More
Kudos2 Stats

Cybercrime Survival Toolkit- Surviving The Most Dangerous Town On The Internet

As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more. ...
Read More
Kudos0

How Do Cybercriminals Make Money?

Since most of what we do is now online, from shopping for food to paying bills, the global economy is taking a digital shift. It’s only natural for criminals to follow suit. As criminals consider the economics of what they do, they recognize cybercrime as one of the quickest ways for them to make money. For a hacker, extortion is an easy way to monetize stolen information and provides the shortest path from cybercrime to cash. In addition to extortion, criminals can make money off of fake auctions, stealing someone’s identity, and by selling stolen information such as credit card numbers, ...
Read More
Kudos1 Stats

Middle School Kit: A Broader World of Cybersecurity Protection

A guide for parents and children. It can be a full-time job for any parent to be constantly aware of everything that their children are doing online. Kids these days may seem pretty sharp with technology and the Internet, however, we forget that they’re still learning (and so are we) and may not always be prepared to spot the risks and pitfalls of being constantly connected. In this two-part article, we’ve put together some tips for you as a parent to ensure that your children are safe on the Internet, and some basic cyber security tips that you can share with your children. The best wa...
Read More
Kudos0

College Kit: How To Keep Devices Secure and Information Safe

College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence. College and technology go hand-in-hand. You use your computer for research and term papers, your phone to keep track of your class schedules, and your tablet to keep up with old and new friends on social media. Technology is a great tool for connecting us all, but that’s the thing- it connects EVERYONE- including cybercriminals.  For e...
Read More
Kudos0

High School Kit: More Independence Online

You’re learning how to drive, looking into potential colleges, getting your first “real” girlfriend or boyfriend, going to dances, parties, making new friends and having fun!  With all of this newfound independence comes amazing new adventures and experiences in your life. It is easy to get caught up in the excitement, but, along with all of your academic studies and extra curricular activities, an education in cyber security can help keep you safe while you keep exploring. Do’s and Don’ts of Cyber Security Phishing 101Phishing is a con game that takes place online, and phishers are ju...
Read More
Kudos0

Grade School Cyber Security Kit: Online Safety 101

The Internet can be a place of endless wonders. It’s where you learn, talk, shop, and play. Still, the Internet is just like anything else in life- there are important rules that everyone should follow in order to make sure they stay safe while online. Follow the Internet rules at school and at home: How much screen time is too much? It’s really easy to get caught up visiting fun websites, and playing awesome games, but there’s also a whole big world to explore, away from the screen! Know when it’s time to put down the mouse and go outside and play. Come to an agreement with your paren...
Read More