• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos1 Stats

5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked

You may not always be aware of the multitude of threats out on the Internet. Read on to find out how to keep yourself protected from lesser known threats lurking on the Internet landscape.

Read More
Kudos1 Stats

The New Norton - Family First

Introducing the new Norton Security. At Norton, we understand that as a busy family in today's connected world, you don't have a lot of time to spend researching Internet Security. That's why we've created the new Norton Security. One comprehensive product, that protects all of your devices. 

Read More
Kudos3 Stats

The New Norton

Introducing the New Norton. Norton Security has combined our greatest features into one, all-inclusive, easy to use product. Offering you complete protection against threats in today's cyber landscape.

Read More
Kudos0

The Worm in the Apple, Part 2 - Smart Security in Apple's Latest Products iPhone 6, iPhone 6+, Apple Pay, and the Apple Watch

Certainly there has been quite a bit of buzz over Apple's latest product announcements. We've taken a look at all of the new technology so you know how to stay safe while you play with your shiny new Apple toys!

Read More
Kudos1 Stats

Android AOSP Browser Bug Could Affect 75 Percent Of Users

A new Android vulnerability, which could allow attackers to view open Web pages on the victim’s Android Web browser or hijack their online accounts, has recently been uncovered, and may impact an estimated 75 percent of android users.   Uncovered in early September, by security researcher, Ray Baloch, the Google Android Browser Same Origin Policy Security Bypass Vulnerability (CVE-2014-6041) reportedly affects any Android version below 4.4. The bug, found in the Android Open Source Project browser (or AOSP browser—a browser that Google no longer supports), could be exploited by an attacke...
Read More
Kudos1 Stats

The Worm in the Apple, Part 1 - Why Mac Users Are Not Immune from Viruses and Malware

Mac users may not be aware that their computers are more susceptible than they realize to the threats of malware and viruses. Read on to learn about the threats you should be aware of, even though you’re on a Mac. 

Read More
Kudos1 Stats

Data Breach - The Best Defense is Vigilance

There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is understanding what the thieves are after, so you can make it harder for them to win. Egan answers some commonly asked questions about shopping and credit card safety: So what is being stolen and how is it being used? In point of sale (POS) breaches, thieves are stealing your 16-digit credit card numbers. Those numbers are most useful to thieves (and ...
Read More
Kudos1 Stats

Social Media Scams Based on Current Events

We are sure you’ve seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this “news” may not be what it seems. In 2016, Facebook has reported that it has 1.71 billion monthly active Facebook users. Twitter has 313 million monthly active users. With so many active users, popular social sites are a scammer's paradise. Scammers will try to entice you into clicking by posting sensational or emotional bre...
Read More
Kudos0

Back Up Your Finals and Midterms to the Cloud

In today’s fast-paced world, you can be sure that most universities have gone digital. As a result, more students are saving their important papers on their computers and external hard drives. However, from what I’ve seen, that’s about as far as most students go to safeguard their work. With so many hours (and lost sleep) going into these papers, it is essential to make sure you have it backed up in the cloud, because there would be nothing worse than losing all of your hard work due to a computer crash or hard drive failure.   If you only save your work on a hard drive, once your compute...
Read More
Kudos2 Stats

How to Spot a Fake Android App

Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Read More
Kudos12 Stats

It’s a New World, It’s a New Norton

The headlines are all too familiar: “Retail Giant Reports Massive Data Breach,” “Russian Gang Amasses Billions of Web Credentials.” Despite the increase in threats, we are moving more and more of our lives on line: from sensitive health and financial data, to precious photos and daily shopping. To complicate matters, our digital lives don’t just reside on a desktop but on multiple devices and platforms. Too many of us remain vulnerable to advanced threats. If we want to free ourselves to take full advantage of our amazing digital, interconnected world, we need to secure ourselves. With th...
Read More
Kudos0

Mobile Security Advice For The New Term

Technology and education now go together more closely than ever, with laptops and tablets now regular sights in classrooms. The range of educational apps in both the iOS App Store and the Google Play Store is huge and growing all the time, and the cloud has made it possible to learn across multiple devices with ease.   And yet, with such progress inevitably comes a downside. With all that extra work being created and stored on our phones and tablets, we have to think carefully about security issues. While your science project might not be the prize a hacker is after, losing it means more t...
Read More
Kudos0

BYOD in K-12 Schools: 5 Tips to Help Parents Keep Their Kids Safe

   Despite controversial beginnings, many school districts across the United States are embracing BYOD—bring your own device—in the classroom by expanding curriculum to include student owned devices. With this trend gaining momentum, some districts are starting to run pilot programs to explore the benefits of bringing mobility to classrooms through BYOD. Rather than fighting against change, forward thinking school districts are moving into 21st century learning environments because they recognize the advantages of incorporating tehcnology and learning applications into the classroom to bet...
Read More
Kudos1 Stats

Top 5 Tips to Protect Your Identity on Campus

Top 5 Tips To Protect Your Identity On Campus Back to school season is upon us, and while you are caught up in the enthusiasm of moving into your new dorms and ogling your class schedules, it is doubtful that the thought of protecting your identity is at the forefront of your mind. However, with 41% of adults having fallen victim to attacks such as malware, viruses, hacking, phishing scams, fraud and theft last year, it’s important to take practical action to keep your information safe on campus. There are the obvious precautions to take in protecting your devices, such as never le...
Read More
Kudos2 Stats

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 websites through botnets (computers that have been infected with and controlled by a computer virus). The sites ranged from small sites to larger household names. Many of the targeted sites are still vulnerable. 2014: The Year Of The Mega, MEGA Breach? In Symantec’s 2014 Internet Security Threat Report, researchers declared 2013 as “The Ye...
Read More
Kudos0

When Were Computer Viruses First Written, and What Were Their Original Purposes?

Modern day computer virus origins may surprise you- their goals were not quite the same as they are today. Early on, viruses had varied utilities and were engineered mostly by people in computer science industries.  College students created viruses for research projects in order to help further their studies and fine-tune their coding skills. In addition to research, those students would also construct code to play practical jokes on their classmates. Engineers at Xerox created a computer worm meant to search for idle processes in a computer network. A pair of programmers created a boot...
Read More
Kudos0

'Backoff' Malware Steals Customer Credit Cards From 600 Stores

Last week, the Department of Homeland Security reported that around 600 businesses fell prey to a Point of Sale malware, called “Backoff”, that steals customer payment details through remote access applications. Most of the businesses affected were small, independent brick-and-mortar retailers, but some larger chains were impacted as well. The scope of the attacks could widen as more affected businesses are discovered. Unfortunately, this kind of criminal activity is growing. Identity theft, according to the Bureau of Justice Statistics, affected 16.6 million people in 2012. Hackers often...
Read More
Kudos0

Mobile Fitness Trackers May Be One Step Away From Hacks

Recently, Symantec Security Response experts conducted an in-depth study on wearable health tracking devices and apps and found that there were multiple vulnerabilities with these devices, which hackers could exploit to gain access to your personal information.    It used to be that your health was information shared between you and your doctor only, but the latest in mobile technology is changing that. The recent boom of fitness and health tracking devices, such as wristbands, heart monitors, and other “wearables” and their accompanying apps, allows many of us to keep better track of ou...
Read More
Kudos1 Stats

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device. Earlier this year, Symantec’s Internet Security Threat Report noted that mobile malware in 2013 was developed almost exclusively for the Android OS, 32% of which steals a user’s personal information. Luckily, Google says that no e...
Read More
Kudos2 Stats

System Admin Day 2014! Reasons to Thank Your System Administrator Today (and Everyday).

Today marks the 15th annual System Administrator Appreciation Day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day here are a few of the top reasons to say thanks. Thank your SysAdmin on System Adminstrator Appreciation Day! When your server goes down at midnight on a Saturday, a sysadmin IT pro has everything up and running by 9a.m. on Monday. That lovely interwebz connection you are accessing to view this very blog from your office network – all thanks to a sysadmin’s handiw...
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click. While it is unfortunate that scammers would look to capitalize on this tragic incident, this is a common t...
Read More
Kudos1 Stats

Security Experts 'Pin' So-Called Miracle Diets As Social Scams

Obesity is a known topic of conversation in the United States, with one in three U.S. adults being categorized as overweight. Most of us have come across posts claiming to promote a new weight loss "miracle" in our online experiences. Healthcare experts are constantly reporting that there is "no such thing" as a miracle diet, but, much like a fabled lake monster, or a giant hairy beast in the woods, legends die hard.  Scammers are always trying to find new ways to lure in vulnerable dieters who still want to believe that an easy solution exists. They use social media as a vehicle to peddle...
Read More
Kudos0

Prevent Scammers From Taking Over Your Company's Social Presence

Social media is a hugely important tool for growing your business’s brand, and the last thing you want to do is expose your customers to spam. Yet we’ve all seen it: the tweet promising thousands of new followers or the Facebook post teasing a way to lose weight or earn easy money – of course only if you’ll click on a link. It’s an issue that’s not going away any time soon, and it must be handled in the right way. The last thing we want to do is make our social media pages less open to the public, so instead we must use the settings available to us to keep spam away, and actively deal wit...
Read More
Kudos3 Stats

Symantec Security Detects Dragonfly's Energy Sector-Targeting Cyber Schemes

New research from Symantec uncovering a cyber-espionage campaign that has affected 1,018 unique organizations across 84 different countries has demonstrated the impact of sophisticated phishing attacks and watering hole techniques. The attacker group, dubbed “Dragonfly” by Symantec security experts (other vendors have called them, "Energetic Bear"), launched a campaign against a range of targets, predominantly in the European and American energy sector, over a number of months. Dragonfly used multiple attack methods to install malware onto systems, extracting passwords and documents among...
Read More
Kudos0

How Can Small Businesses Develop Trust with Customers?

In a small business, your top priority when dealing with customers is trust. Recent high-profile security breaches have eroded consumer confidence, and it’s more important than ever to reassure your customers that they’re safe shopping with you. According to Symantec’s Sr. Director of Product Management, Robert Hoblit, the vast majority of visitors to any shopping site will arrive through web search or advertising, and first impressions are vital. “Around 80% of the customers that land on your website are actually first-time buyers,” he says. “They’ve never seen you before, they’ve never ...
Read More
Kudos0

Will Amazon’s Fire Phone "Burn" Users?

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone. For the original article, and to catch the latest security intelligence information, check out Symantec's Security Response blog: http://www.symantec.com/connect/blogs/will-amazon-s-fire-phone-burn-users     Everyone has heard stories about smartphones with malfunctioning battery packs bursting into flames, but the new Amazon Fire Phone, despite its name, could pose a different kind of danger. Amazon’s recently announced device is due to be released in July and may present some pote...
Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.     Follow these secure Wi-Fi ha...
Read More
Kudos0

BYOD vs. CYOD: What's The Best Fit For Your Business?

The last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature. But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every e...
Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats. You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs wa...
Read More
Kudos0

Quick Tip Guide to Kids' Social and Mobile Privacy

You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps. You can have the usual parent-child conversations about not chatting to strangers and not revealing too much about themselves, but sometimes the apps take matters into their own hands and give away more than they should. Check out these quick steps you can take to make socia...
Read More
Kudos1 Stats

Securing Your Small Business Social Media Plan

Today's social media is a crucial tool for business,  Companies that use Twitter, Facebook and other tools in an organised and efficient manner can achieve incredible engagement for relatively little cost, and (with a healthy dose of good fortune) a strong social media campaign can take off around the world and do more for brand recognition than traditional advertising. The key is finding the right balance between informal spontaneity and well-planned company output, and it’s a balance a huge number of businesses are finding hard to get right. Engaging with customers and listening to cons...
Read More
Kudos0

3 Hot Mobile Security Tips For Summer Travel

Summer’s finally here, so whether you intend to take a picnic to the park, play with the children in the garden or jet off to somewhere even sunnier, some simple precautions will keep you and your devices safe this summer. Watch your devices First up, physical security. With more outdoor activity it’s natural that it won’t only be your smartphone that travels with you. Parks these days are full of tablets and even lightweight laptops, to go with the many Kindles and Bluetooth speakers, so it pays to be aware of just how valuable your possessions are. Don’t leave them lying in plain sight...
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud? My answer? Absolutely not. Zone is only one cloud service, among many, that Syman...
Read More
Kudos0

In Defense of Devices: Cyber Security Concerns Spread Beyond Your Phone

We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly. As the report states, last year saw high-profile hacks of baby monitors, security cameras and even home routers by cybercriminals. Meanwhile, security researchers dug around in the software of other devices...
Read More
Kudos0

Smart Tips For Smart TV Watching With Dad

It’s Father’s Day once more on June 15th, but this isn’t any old Father’s Day – this one might as well have every dad’s birthday and Christmas Day rolled in as well. Yes, Father’s Day in 2014 falls right at the start of the World Cup in Brazil and on the final day of the US Open golf championship, which makes it all the more likely that dad will be settling down in his armchair to enjoy that new Smart TV he’s had his eye on. But as with anything that connects to the Internet, it pays to be aware of the security issues, and Smart TVs are no different. Only this week the news has been full ...
Read More
Kudos0

Top 10 "Riskiest" Websites

We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Software is constantly changing, and it takes time and resources to keep a website running on the latest, fully patched software. According to Symantec’s security expert, Kevin ...
Read More
Kudos7 Stats

What's The REAL Cost of 'Free'?

Consumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected. Advertising The acceptable way to monetise free software is to use advertising, and whether you’re okay with that will largely depend on how much you want that new app without paying for it. As the saying goes, “if you’re no...
Read More
Kudos1 Stats

How Safe Is That App? Mobile Security Expert Tips To Help Protect Your Mobile Device.

Mobile apps have transformed the way we interact with our smartphones and tablets. If you’re looking for a quick way to access your bank accounts, a tool to make you more productive while on the move, or a game to help pass the time while you’re waiting for a bus, there’s an app for that. In fact, with over 1 million apps on Google Play, for instance, there are often thousands of options to choose from in each app category. The fact that many can be downloaded in a matter of seconds means that you’re only ever moments away from installing a tool that could bring innovative new functionali...
Read More
Kudos1 Stats

Time-Saving Software To Simplify Your Life

There’s no doubt that technology has made many areas of our lives simpler. We can now access files from any device, anywhere, and we can take full advantage of fast internet speeds to do things that weren’t possible just a few years ago. But as we use more technology, that simplicity can be eroded as our devices demand monthly, weekly, even daily updates. Our software applications add new features we didn’t ask for but have to learn and our documents move from one hard disk to multiple locations around the cloud, each with their own logins and capacity limits. Technology can greatly impro...
Read More
Kudos2 Stats

Antivirus-Only Is Dead. Long Live Security!

Are you doing enough to keep your information safe? With today’s sophisticated cyber threats you need more than just traditional antivirus (AV) software to stay protected. AV software can prevent, detect and remove malicious computer programs, and while more traditional viruses and email spam still exist, people now have more complex threats to worry about – and more important information to protect.  You need to guard your devices from not only viruses and worms, but web threats, spam and phishing. Cybercriminals can also use drive-by methods for stealing information and concealment malw...
Read More
Kudos0

Cybersecurity Trends and How-to Protect Your Business

Information security is more important than ever when it comes to safeguarding small business. According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. In 2014, we identified a few technology trends that will have a direct impact on small businesses and the way they protect business critical information. All eyes will be on protecting Privacy From scary headline news to a much-needed wake-up call, consumers and sma...
Read More
Kudos0

Why Symantec Says That The Covert Redirect Flaw in OAuth and Open ID is 'Not As Bad As Heartbleed'

Some media outlets are sounding the alarm about the recently discovered Covert Redirect flaw in OAuth and OpenID being “the next Heartbleed.” Symantec experts have assured people that it’s not. What is this Covert Redirect flaw? The vulnerability exploits web and mobile applications that allow users to login via OAuth (an application that lets 3rd parties access account details from other websites, such as social media sites). It allows attackers to disguise a fake login popup, using the affected website’s real domain. These attackers can collect login information from users if they autho...
Read More
Kudos2 Stats

When It Sounds Too Good To Be True, It Probably Is (A Scam)

How safe was your family online in the last year? According to Symantec’s Internet Security Threat Report 2014, they weren’t as safe as you might think. The study analyses threat data from over 157 countries, more than 41.5 million attack sensors and a database of over 60,000 vulnerabilities, making it the most comprehensive picture of internet security in the world – and it says mobile users are falling for more “too good to be true” scams than ever. Bad behavior   An incredible 38% of mobile users have experienced cybercrime, and it’s often down to their own behaviour. More than half of...
Read More
Kudos4 Stats

New Zero Day Internet Explorer Bug

Norton users* can breathe more easily knowing that they are backed by Norton by Symantec’s gold standard of security in light of a security advisory about a new zero-day bug affecting Microsoft Internet Explorer. Other vendors are using the name “Operation Clandestine Fox” to identify targeted attacks using this bug in the wild.  Users of all versions of Internet Explorer are vulnerable, but, so far, this bug is not being used in widespread attacks.    Microsoft will be issuing a patch for supported operating systems, but Windows XP users will need to find another way to stay secure, as ...
Read More
Kudos0

Keeping Your Business Safe From Attack

According to the 2014 Symantec Internet Security Threat Report, which examines the data from more than 41.5 million attack sensors and records thousands of events per second, spear phishing is not dead – it’s merely evolving. The technique uses fake emails to target a specific organisation in order to gain access to internal data, and although attackers used fewer emails on fewer targets last year, the total number of spear-fishing campaigns was up a startling 91%. More user awareness and better security means attackers are simply choosing their targets more carefully and sharpening their ...
Read More
Kudos2 Stats

Dr. Strangebug, or How I Learned to Stop Worrying and Accept Heartbleed

By Satnam Narang, Symantec Security Response expert. No matter where you went this week, you likely heard about something called Heartbleed. If you happened to be living under a rock (some might say you were better off there), you may not have heard that there was a major vulnerability discovered in OpenSSL, the open source implementation of the protocols used to secure communication over the Internet. The reason it received a lot of attention is because a half a million trusted websites were vulnerable at the time this news first came to light. Does this mean the Internet is broken or is...
Read More
Kudos2 Stats

Android vs iOS: Which is More Secure?

They’re both selling by the millions, with no sign of slowing down, but there are big differences between the iOS and Android mobile platforms – not least in the array of security threats they face, and the ways in which they attempt to mitigate them. You’re never totally secure when using a mobile device on either platform, but should the security conscious be choosing one over the other? The Threat Level If we’re talking purely about the level of threat that exists on the two platforms, it would seem iPhone and iPad users have the better side of the deal. Studies have found that a fa...
Read More
Kudos2 Stats

Heartbleed Bug: What You Need to Know and Security Tips

What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more: "Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Read More
Kudos1 Stats

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to b...
Read More