• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Primary tabs

Search

Search results

How Safe Is Surfing on 4G vs. Wi-Fi?

日本語 You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way? Truth be told, nothing is 100% safe. How ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
04-Jul-2016 | 6:00AM
Comments:
1
Kudos:
1

DefCon 24- Hacking to Make the World a Better Place

a primer for you to become familiar with some of the more common threats out there: Malware 101: What ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
11-Aug-2016 | 3:27PM
Kudos:
1

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
09-Aug-2016 | 8:33AM
Kudos:
2

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
09-Aug-2016 | 10:48AM
Kudos:
3

How Can I Tell If I Have Malware and What Can I Do About It?

Português Español Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors enc ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
14-Apr-2016 | 10:48PM
Kudos:
0

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, the ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
12-Apr-2016 | 10:46PM
Comments:
1
Kudos:
1

Malware 101: What Is Malware?

Português Español Spyware, ransomware, and bots, oh my! A lot of these terms are prevalent on the Internet, but it may seem impossible to know what all these terms mean, and how they actually affect your devices and personal information. The term, “virus” ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
12-Mar-2015 | 2:29PM
Comments:
3
Kudos:
2

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
01-Jul-2016 | 10:30AM
Kudos:
1

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Author:
J2K2 Employee
Posted:
25-Mar-2016 | 5:44PM
Kudos:
4

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
29-Jun-2016 | 10:00AM
Kudos:
0

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Author:
J2K2 Employee
Posted:
14-Mar-2016 | 11:41AM
Kudos:
2

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordi ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
04-Jun-2016 | 12:00PM
Comments:
1
Kudos:
0

Teach Your Kids to Avoid Online Scams

Português Español Surfing the Internet means possible exposure to online scams, something your children might not have any concept of. If you’re allowing them to go online, it’s imperative that you discuss online scams. Such scams come in a variety of gui ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
20-Apr-2016 | 6:49PM
Comments:
1
Kudos:
1

How To Stay Ahead of Zero Day Vulnerabilities

Zero Day Vulnerabilities are a newly discovered software vulnerabilities that are unknown to the manufacturer. A software vulnerability is a weakness in the software where cybercriminals can sneak malware onto your computer. In these cases hackers will ru ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
11-May-2016 | 2:48PM
Kudos:
1

How to Let Go of Old Tech Securely and Responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properl ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
29-Feb-2016 | 3:30PM
Kudos:
2

Symantec Financial Threats Report Gives Consumers Security Tips

It’s tax season, so our finances are top of mind for many of us. Cybercriminals are thinking about our money, too. After all, most cybercrimes are committed for monetary gain. According to the Symantec report titled “ Financial Threats 2015,” cyber thieve ...
Blog Post
Author:
J2K2 Employee
Posted:
24-Mar-2016 | 8:08AM
Kudos:
2

Sneaky Spammer Tactics and How To Avoid Them

Português Español Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics c ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
14-Mar-2016 | 12:30PM
Kudos:
0

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cyber ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
16-Mar-2015 | 2:18PM
Kudos:
3

What Are Malicious Websites and Drive by Downloads?

Most people are unaware of the fact that you don’t have to intentionally download a malicious attachment in order to compromise your computer’s security. Malicious websites and drive-by downloads are just two ways that your security can become compromised ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
30-Nov-2015 | 1:30PM
Kudos:
2

Malware 101: How Do I Get Malware on My Computer? Part One

We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer? Bundled Free Software Programs Free is never usually 100% free when it comes to software ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
16-Mar-2015 | 2:05PM
Comments:
1
Kudos:
4

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

5 Ways You Can Help Yourself Stay Secure Online

When you’re using the Internet, your Internet security suite can only go so far to protect you from potential dangers like spyware, ransomware and malware. You have to do some of the work yourself, because there are some threats that no Internet security ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
22-Mar-2016 | 1:00PM
Kudos:
0

Software Terms of Service and Privacy Policies Explained

Português Español If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing th ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
10-Feb-2016 | 2:25PM
Kudos:
0

What Are Browser Hijackers?

A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home pag ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
10-Mar-2016 | 10:38AM
Kudos:
0

5 Tips to Protect Yourself from Online Travel Booking Scams

Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of phony travel booking websites is growing because they’re so ...
Blog Post
Author:
J2K2 Employee
Posted:
08-Mar-2016 | 8:41AM
Kudos:
3

7 Ways to Ensure Your Data Is Safe During Vacation

It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
08-Mar-2016 | 11:44AM
Kudos:
1

Internet Scams Based on Current Events Plague Users

It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel empathy for the victims of tragic current events, or even ...
Blog Post
Author:
J2K2 Employee
Posted:
19-Feb-2016 | 1:35PM
Kudos:
2

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely. ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
17-Jan-2016 | 9:43AM
Kudos:
0

What Are Bots?

Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
03-Mar-2016 | 1:33PM
Kudos:
0

How to Prepare a Smartphone or Tablet for Vacation

There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, a ...
Blog Post
Author:
Nadia_Kovacs Employee
Posted:
02-Mar-2016 | 3:41PM
Kudos:
1