Author: Nadia_Kovacs30 Employee Posted: 11-Feb-2015 | 2:20PM · 0 Comments
This month, American singles will flock to the multitude of dating services that are available online. Online dating has lost the stigma it once had, as a study conducted by Pew Research found that one in ten Americans have used an online dating website or mobile app in 2013. With the negative stigma of online dating nearly abolished, the popularity of these services is on the rise, which has caught the attention of scammers.
Author: NortonAPJ27 Employee Posted: 05-Feb-2015 | 7:01PM · 0 Comments
It is that time of the year again where unforgettable and sharable memories are made with family and friends. While you enjoy the festivities this Lunar New Year, don’t forget to stay safe online.
Norton wishes you an exciting (and secure!) year ahead!
Author: Nadia_Kovacs30 Employee Posted: 05-Feb-2015 | 5:33PM · Edited: 04-Jun-2015 | 3:50PM · 0 Comments
Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our information becomes more and more digitized, cyber attacks will continue to be an unfortunate part of our lives in the future.
What is Data Privacy Day?
Launched January 28th 2008 as an extension of Europe’s Data Protection Day celebration, Data Privacy Day (DpD) aims to empower and educate consumers and businesses about the importance of data privacy and the affect of their digital footprint.
It’s a very common scenario, a parent—grandparent, aunt, or uncle—buys the latest model smartphone or tablet and hands-down their previously used device to a grandchild, niece, or nephew. This is especially common during the Holidays with connected devices topping most youth’s wish lists.
And with companies like eBay, Verizon, and AT&T competing to buy your used devices, now there’s an additional incentive to hand-down your old device and upgrade this holiday season.
If you plan to purchase security software along with your Internet connected gadgets this Holiday Season, you are on the right path to securing your digital and personal information. However, with so many options available—free and paid—it’s not always easy to choose or distinguish between legitimate and fraudulent software.
Author: Nadia_Kovacs30 Employee Posted: 19-Dec-2014 | 11:11AM · Edited: 21-Sep-2016 | 2:00PM · 0 Comments
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Author: SavvyMediaGal27 Employee Posted: 18-Dec-2014 | 12:19PM · Edited: 13-Aug-2015 | 4:03PM · 0 Comments · Translation:
As the name implies, a firewall is a protective barrier and its job is similar to that of a physical firewall. They stand between your computer and the rest of the digital world to keep you protected from online threats. A firewall is a software program or piece of hardware that secures your computer by limiting who can send you information. All information entering or leaving a network passes through a firewall, which either allows or blocks information based on specified security criteria.
How does a firewall protect you?
Author: SavvyMediaGal27 Employee Posted: 16-Dec-2014 | 2:01PM · 0 Comments
We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores.
Remember these key tips to shop safely online:
Author: Fran Rosch27 Employee Posted: 10-Dec-2014 | 4:51PM · 0 Comments
Newly released Symantec research indicates that most consumers worry about mobile app security and privacy risks. However, most consumers unknowingly – sometimes even willingly – put personal information at risk, compromising their own privacy. In fact, the study found that many of those who worry the most about mobile privacy are the least likely to take precautions to protect themselves—all in exchange for free app downloads.
Author: Melissa_Segura27 Employee Posted: 10-Dec-2014 | 9:06AM · 0 Comments
Experiencing and using the latest innovations in technology is always exciting—and wearable devices are no exception. Driven by technological advances, social factors, and the Internet of Things, consumers everywhere are enthusiastically embracing wearable technology. As a result, being connected to the Internet is becoming a part of daily life, creating a reality where the physical and digital worlds intersect and overlap at an unprecedented rate, often leaving security behind.
Author: SavvyMediaGal27 Employee Posted: 08-Dec-2014 | 11:10AM · 0 Comments
WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans!
HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY
Passwords are to a hacker like keys to a thief. Although keys and passwords by themselves don’t have much value, the personal information and property that they can expose does. Think of your passwords as your digital keys. They allow access to your personal life, including your networks of friends and colleagues, contacts, photos, videos, emails, and maybe even banking and payment details, among other gems of information.
The mobile apps we use can provide other parties access to our information and everything on our devices. Our smart devices are powerful computers, containing valuable information, such as passwords, contacts, phone numbers, photos, videos, and maybe even banking details. Thus, it’s very important to understand the privacy and security implications that come with using any app. Guard your information by exercising caution and by taking three simple steps.
Author: Nadia_Kovacs30 Employee Posted: 01-Dec-2014 | 9:30AM · 0 Comments
On the Twelfth day of Christmas, my true love gave to me, a virus infected PC.
Every year, scammers and cybercriminals look to take advantage of the influx of online holiday shopping. We've rounded up the 12 most popular scams of holidays past that are sure to make an appearance again this year. Be on the lookout for these popular scams, and as long as you stay protected, go forth and shop till you drop, on your couch!
Author: SavvyMediaGal27 Employee Posted: 25-Nov-2014 | 3:20PM · Edited: 13-Aug-2015 | 4:02PM · 0 Comments · Translation:
Wearable devices, the connected home, and the connected car, although all relatively new technologies, have quickly become the new rage in tech. Everything from the devices in your pocket, to the appliances in your home, and the car you drive can transmit information about your life habits because they all have one thing in common: they are connected to the Internet and you are connected to them. And in some cases they are connected to each other. This new tech phenomenon is called the Internet of Things (IoT).
Author: Melissa_Segura27 Employee Posted: 24-Nov-2014 | 11:06AM · Edited: 09-Dec-2016 | 1:14PM · 0 Comments · Translation:
The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. Don’t let the numerous deals and distractions cloud your judgment; it’s always important to pay attention to signs that your transactions are secure. You can still shop online and take advantage of Black Friday and Cyber Monday deals with peace of mind. You just have to know what to look for and adhere to simple safety measures.
Author: Melissa_Segura27 Employee Posted: 17-Nov-2014 | 11:00AM · Edited: 15-Jul-2015 | 9:41AM · 0 Comments · Translation:
In the world of e-commerce, cybersecurity, trust and sales are all interrelated, each influencing the other. The more trust indicators you display on your website, the more trust you gain, and the more trust you gain, the more sales you win.
Author: SavvyMediaGal27 Employee Posted: 03-Nov-2014 | 10:58AM · 0 Comments
WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans!
HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA
Date: Tuesday, November 11th, 2014
Time: Doors at 7:00 pm
Location: 777 Valencia St, San Francisco, CA 94110
With plenty of free security software options out there, it’s easy to wonder why you would want to pay for online protection. But is free antivirus software truly free?
Author: SavvyMediaGal27 Employee Posted: 27-Oct-2014 | 2:00PM · Edited: 13-Aug-2015 | 3:58PM · 0 Comments · Translation:
Although, you might not know what they are or how they work, if you go online, it’s likely you’ve heard of cookies before. But given the negative publicity surrounding them, perhaps you have been led to believe they are dangerous. On the contrary, cookies by themselves are rather harmless and simple. However, if privacy issues concern you, there’s always the option to opt-out.
First, an introduction to cookies
Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your company's data.
Security researchers have discovered a new bug, called, Shellshock, that affects Linux and Unix platforms. If exploited, the bug could impact public facing web servers and Mac OSX users. Our experts let you know what you can do to keep your data safe.
Author: Nadia_Kovacs30 Employee Posted: 24-Oct-2014 | 12:57PM · 0 Comments
Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses terrorizing computer users everywhere.
Happy Halloween from the Symantec Storytelling team!
Author: Nadia_Kovacs30 Employee Posted: 20-Oct-2014 | 10:38AM · Edited: 21-Sep-2016 | 2:01PM · 0 Comments · Translation:
Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure?
Author: Nadia_Kovacs30 Employee Posted: 20-Oct-2014 | 9:39AM · Edited: 11-May-2015 | 1:26AM · 0 Comments · Translation:
With the popularity of smartphones and tablets growing in the consumer markets, many employees choose to “bring your own device (BYOD)” to with them to work. Learn how to secure your data along with your employees' technology in this 13th article for National Cyber Security Awareness Month.
The connected home, or smart home, is the next big thing within the Internet of Things (IoT). Here we examine the security concerns of this new emerging technology, and give you tips on how to keep your automated home safe.
Author: Nadia_Kovacs30 Employee Posted: 16-Oct-2014 | 12:26PM · 0 Comments
For the first time, tech industry leaders team up with Symantec to help reduce the amount of malware on the Internet landscape. The information and data-based companies are sharing their intelligence so that their services will provide a broader scope of malware detection.
Author: Nadia_Kovacs30 Employee Posted: 15-Oct-2014 | 2:07PM · Edited: 14-Apr-2015 | 2:47PM · 0 Comments · Translation:
Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information.
Author: Nadia_Kovacs30 Employee Posted: 14-Oct-2014 | 7:48PM · Edited: 21-Sep-2016 | 2:02PM · 0 Comments · Translation:
You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog:
The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the Internet, including Dropbox.
Author: Fran Rosch27 Employee Posted: 14-Oct-2014 | 1:51PM · 0 Comments
Fran Rosch shares perspective on the decision to separate Symantec into two companies: the Information Management business, and the Information Security business, which includes Norton. "I also strongly believe that we can best capture the opportunity by operating as two companies, enabling each company to better focus on addressing customer needs to deliver more impactful customer experiences." Read more...
Author: Nadia_Kovacs30 Employee Posted: 08-Oct-2014 | 1:59PM · Edited: 14-Apr-2015 | 2:51PM · 0 Comments · Translation:
October is National Cyber Security Awareness month. Mobile fitness trackers are a new technology that is all the rage. Learn how to secure your health data and continue to use these useful tools in becoming a healthier you. This is part 10 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape.
Author: Nadia_Kovacs30 Employee Posted: 06-Oct-2014 | 3:31PM · 0 Comments · Translation:
There are a plethora of free mobile apps on the market, but as the old adage goes "There's no such thing as a free lunch." Almost half of the free apps on the market are looking for something in exchange. Read on to find what you are and are not willing to trade for that app.
Author: Nadia_Kovacs30 Employee Posted: 03-Oct-2014 | 12:38PM · Edited: 14-Apr-2015 | 2:48PM · 0 Comments · Translation:
With the mobile market gaining on PCs, cybercriminals are setting their sights on mobile devices. Learn how to protect yourself from mobile malware, phishing attempts, social media scams and more.