• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos5 Stats

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things. However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices. What Is a Smart Home? While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
Read More
Kudos1 Stats

The smarter home: How to cut the cord with a smart TV

Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from cable service providers can be costly, and for many cutting the cord can also cut the bill. If you’re on the fence here are a few tips to get you started and most importantly home network security best practices to consider. Smart TVs are making headlines for faulty security and privacy risks. So when you cut the cord, stream smarter and more secure. Here’s how:  Step one: A smart TV Smar...
Read More
Kudos1 Stats

How Do Businesses Get Hacked?

While organizations may have some of the best security in the world protecting their information, there are people who are in charge of creating and handling that information.. Because people’s brains are impossible to secure via software, social engineering plays a key role in allowing cybercriminals to bypass computers and security software to commit acts of cyber espionage. Attacks on governments, healthcare institutions or any other organization, require a special blend of both social engineering tactics and technical attacks. The most common form of attack used to infiltrate a governm...
Read More
Kudos0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordingly.

Read More
Kudos2 Stats

What is Cyberbullying?

Online socializing has both good and bad sides to it. While it has opened a whole new dimension of ways to communicate and has added convenience to our lifestyles, it unfortunately has some unpleasant effects too.

Read More
Kudos3 Stats

The Dos and Don’ts of Using Public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.

Read More
Kudos3 Stats

What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi

If you’ve ever wondered if it’s safe to use public Wi-Fi, you are not alone. In fact, according to the Norton Cybersecurity Insights Report, 6 in 10 consumers believe using public Wi-Fi is riskier than using a public restroom. And it is. Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk. That’s why a virtual private network, better known as a VPN, is a must for anyone worried about online security and privacy. 

Read More
Kudos3 Stats

The Risks of Public Wi-Fi

Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte? What Is Public Wi-Fi? Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots”...
Read More
Kudos4 Stats

Your Summer Vacation Guide to Mobile Device and Public Wi-Fi Security

Vacation may be a time for rest and relaxation, but your mobile devices likely won’t be getting a break. Now that smartphones and tablets are part of our daily lives, we spend more time than ever staying connected, even while on vacation. Just think of all the selfies you’ll be taking and updates you’ll be posting to your social networks! But, while sharing your vacation moments will be a fun way to capture your R&R, your fun vacation could turn into a bad situation if you choose to use your mobile devices on free public Wi-Fi during your trip. Learn how to be aware of using your mobile devices on public Wi-Fi at key points on your vacation.

Read More
Kudos2 Stats

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or paying bills while on public Wi-Fi, you could be letting cybercriminals spy on your sensitive and personal information. VPNs, or virtual private networks, like Norton WiFi Privacy can turn those public Wi-Fi hotspots into secured private connections. Watch this short (30 seconds!) video to see how a VPN could give you a new sense of security on Wi-Fi. ...
Read More
Kudos3 Stats

New Years Security Resolutions

While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life. Software Updates- Install Early, Install Often Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
Read More
Kudos2 Stats

The Importance of Data Back-Up

Have you ever lost a lot of really important data? Or, alternately, have you ever had a moment of panic where you thought you did? Whether it’s images of a family vacation, a report from work or a semester’s worth of homework, you probably have data on your computer that’s not just valuable, it’s too valuable to lose. Backing up your data regularly will help you to avoid the crushing feeling that comes with finding out that all your hard work and treasured memories are gone. The Importance of Backing Up Let’s face it, no matter how great your computer or external hard drive are, one da...
Read More
Kudos1 Stats

How Safe Is Surfing on 4G vs. Wi-Fi?

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way? Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them. How Do Mobile Devices Connect to the Internet? Let’s break down the three different ways your mobile device can connect to the Internet, and...
Read More
Kudos2 Stats

What Is a No-Log VPN Network?

Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider.

Read More
Kudos1 Stats

Netiquette For Parents

No one said parenting is easy. Especially when your children are doing things in the cyber world that you as a child never imagined. With the wealth of information and non-traditional methods of making friends and hanging out, our children are no doubt having a good time, thanks to the advancements in technology. But that still doesn’t mean they have the liberty to do as they please at the expense of others. One of the most important aspects of parenting is setting a good example. Your kids will closely watch your online manners and etiquette. You need to be aware and educated about net...
Read More
Kudos2 Stats

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all.

Read More
Kudos4 Stats

Top Ten Cyber Security Predictions for 2017

The Internet threat landscape was booming last year for cybercriminals. We reported on 54 major events in 2016. And that’s not counting the little stuff. The threat landscape shifted slightly in the past year, and we have seen some new trends. However, some of the older ones are sticking around and still going strong. New Threat Predictions for 2017 1. The Internet of Things   The First Major Attack on IoT Devices​ 2016 was the breakout year for attacks on IoT devices. In October, the first massive cyber attack involving IoT devices, such as​ ​webcams and DVRs, occurred. The ​Mirai B...
Read More
Kudos4 Stats

Data Breaches That Made Headlines in 2016

980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses. 2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question. As we look back at 2016 here are some of the most impactful data breaches that shook the world. 117 Million Lin...
Read More
Kudos4 Stats

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure.

Read More
Kudos4 Stats

How to Securely Set Up Your Home Wi-Fi Router

Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you could be letting anyone with a wireless-enabled device gain access to your home network. That means you’re opening up your emails, banking information, and maybe even details of your smart home’s daily schedule to criminals.  Basic Wireless Security Every router should have a password to keep out the bad guys. Some routers come with default passwords, but you should change these during setup. C...
Read More
Kudos2 Stats

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well-known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls. 

Read More
Kudos3 Stats

How To Set Up and Secure Your New Tech

Congratulations on your new device! You’re likely caught up in the fun of having a new gadget, and probably shopping for a shiny (or sparkly) new case. While a case protects your device from nature and clumsy hands, it doesn’t make your phone absolutely safe. Why? Because it doesn’t protect what matters most—your information. Think about all that you do on your devices—sharing precious photos, ordering your favorite latte, and shopping. With the rise of cybercrime and the high costs associated with it, it’s even more important that you learn how to protect what matters most—the personal i...
Read More
Kudos2 Stats

What Is A Man In The Middle Attack?

In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmissions, intercept data that is specifically targeted as valuable, and capture the data. Sometimes this data can be modified in the process of transmission to try to trick the end user to divulge sensitive information, such as log in credentials. Once the user has fallen for the bait, the data is collected from the target, and the original data...
Read More
Kudos1 Stats

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and stored in the cloud, or servers with an ongoing connection to the Web.

Read More
Kudos3 Stats

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads to increased productivity. It is safe to say that the Internet is for everyone and does not limit itself to the tech savvy. Unfortunately, when not safeguarded, the Internet can be a playground for nefarious activities caused by people with malicious intent.   Take a home wireless network as an example. Almost every member of the family accesses it through laptops, PCs, cell phones and tablet...
Read More
Kudos2 Stats

Malware 101: What Is Malware?

Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” has been the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. The threats on the cyber landscape have evolved into more than just viruses, and can cause mu...
Read More
Kudos5 Stats

Password Managers Are The Key To Secure Passwords

According to the credit reporting firm Experian, the average Internet user has about 19 different online accounts, for which they only have seven different passwords. In addition, one in ten users never change their online passwords, and one in 20 uses the same passwords for all of their online accounts. Those statistics definitely show that the password system is broken. When passwords were invented in the 60's, they were rather simplistic, as there was not  a wide scale need for them. Today we have passwords for an exponential amount of web services. Couple that with the fact that we no...
Read More
Kudos4 Stats

Is Paying For Antivirus Software Worth It?

Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. The price of digital safety It’s hard to put a price tag on digital safety. Take malware for example. These sneaky little codes find their way into your devices and transmit your personal information to computers far away that are operated by fraudsters. The end result could translate into anything from cybercriminals draining your bank account to holding all your information hostage by freezing your device and asking ...
Read More
Kudos5 Stats

Why Hackers Love Public WiFi

A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Online Crime Takes Many Forms The Norton Cybersecurity Insights Report announced that 594 million people around the world were victims of cybercrime in 2015, with 21% of Americans getting their email hacked and 12% having their financial data stolen after shopping online. With public Wi-Fi available everywhere, what seems like a conveni...
Read More
Kudos9 Stats

Why clean computing matters

February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs. ​Why is cleaning up your computer important? Clean software helps protect your data.  Internet security software and regular program updates help ensure that viruses, malware, and remote “hackers” stay out of your system.  When you maintain your files by backing them up, deleting unused programs,...
Read More
Kudos5 Stats

The ultimate guide to online dating

Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. However, these aren’t issues that should deter you from fishing in the sea of online dating. In this guide, we will take you step-by-step through the entire online dating process. From finding the best dating site, protecting your digital privacy, all the way up to that first date, we’ve got you covered. Step 1 Choosing the right site The cyber-sea of love can be overwhelming to navigate...
Read More
Kudos4 Stats

Love, lies and online dating

It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the probability of finding a suitable companion. As in finding love the traditional way, online dating too also has its pros and cons. A recent survey by Norton among men and women in Australia and New Zealand revealed that almost a quarter of the people who have tried online dating and no longer have a profile have found their partner online. The survey* conducted among New Zealanders and Austra...
Read More
Kudos4 Stats

LifeLock joins consumer business unit at Symantec

We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise subsidiary ID Analytics, is underway. There is a lot of passion and excitement from our combined team around the promise and potential we have together to provide a comprehensive digital safety platform that gives you, our customers, a greater sense of security with the addition of identity theft protection expertise. With this acquisition, Symantec is redefining what safety means in a connected w...
Read More
Kudos2 Stats

How to Let Go of Old Tech Securely and Responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properly protected online. To help you remember, every time we have a leap year ask yourself: when was the last time I bought a new computer? If you can’t remember, chances are you may be due for an upgrade. Once you’re ready to make the switch, you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled,...
Read More
Kudos3 Stats

Why Your Online Privacy Matters

To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide. What Is Privacy? Privacy is closing your bedroom curtains when getting ready for bed. Privacy is visiting with your doctor behind closed doors. While in real life this type of privacy comes naturally, with little thought, in the digital s...
Read More
Kudos1 Stats

The Personal Impact of Cybercrime

Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime within the last year alone. The reason for this staggering number is simple. Most people don’t take the right precautions to protect their digital lives. While some are unaware of online dangers others think it can be dealt with after it happens. The truth remains that cybercrime is evolving rapidly and impacting the daily and digital lives of people. Revealed in a survey conducted last ye...
Read More
Kudos3 Stats

How to Improve Your Wi-Fi Signal at Home

Every day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your home Wi-Fi service.

 

Read More
Kudos1 Stats

How a VPN Can Help Hide Your Search History

Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds. But did you ever stop to wonder what happens to your searches?

Read More
Kudos1 Stats

The 12 Days of Norton

"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,

And make sure this season is the best of your year."

Join us every day for a new Norton tip to keep your holidays merry and bright. A secure holiday is a happy holiday with Norton.

Read More
Kudos2 Stats

Holiday Travelers' Tips for Device Security in Airports

As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport. 

Read More
Kudos2 Stats

Norton Introduces Elegantly Designed Norton Core- A Digital Safety Solution for Connected Homes

New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security Mountain View, Calif. – Jan. 3, 2017 – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for pre-orders today and will change the way people secure their connected homes. Today’s home networks, b...
Read More
Kudos2 Stats

How To Stay Safe Online During Black Friday and Cyber Monday Holiday Shopping

The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. Don’t let the numerous deals and distractions cloud your judgment; it’s always important to pay attention to signs that your transactions are secure. You can still shop online and take advantage of Black Friday and Cyber Monday deals with peace of mind. You just have to know what to look for and adhere to simple safety measures.

Read More
Kudos2 Stats

Online Christmas Shopping: Naughty or Nice?

Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online. Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online. While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of peop...
Read More
Kudos1 Stats

Data Privacy Day 2016: Ten Ways to Keep Your Data Private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and progress, it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. One can’t assume your phone and the information it stores is safe from the malicious intentions of the human mind. Data Privacy Day (DPD), is an international effort held annually on January 28 in order to hel...
Read More
Kudos1 Stats

7 Dos and Don’ts of Secure Online Tax Filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it. As online fraud continues to grow, an unfortunate number of American citizens might face this scenario: It’s tax season, and you are getting your paperwork together in order to file your taxes. During the process you receive an email from the IRS stating “Congratulations on filing your tax return.” This is a normal email you would expect after you file taxes, however, ...
Read More
Kudos0

Happy Halloween From Norton by Symantec!

Read More
Kudos1 Stats

Safe Online Shopping Tips for The Holiday Season

The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic. While online shopping has made our lives easier, it also exposes new weaknesses with the information we use to make those very purchases. The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. In fact, Norton Safe Web found that shopping sites are amongst the top ten most frequently exploited websites. An additional concern is bogus e-commerce websites, which are made to look le...
Read More
Kudos2 Stats

How to Spot a Fake Android App

Just because an app is in the Google Play Store doesn’t mean that it is a legitimate app. Google is constantly removing fraudulent apps from the Android marketplace, such as fake antivirus, browsers, and games.  Besides Google Play, and other app markets, there are many other ways that fake apps can get onto your Android device. Scammers will try any means necessary to trick you into installing a fake app. Criminals use emails and SMS messages that appear to be from your bank, credit card company or other brands to trick people into downloading applications that will compromise their data....
Read More
Kudos1 Stats

New Year, Renewed Readiness

With a new year comes renewed excitement, refreshed minds and revitalized focus for all that lies ahead. The same is unfortunately true for the cybercriminals we are up against.

Read More
Kudos3 Stats

The 5 Stages of Phone Loss Grief

It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat. After what seems like an eternity, you come to the crushing realization that you have lost one of the most valuable material possessions...
Read More