• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

How To Avoid Identity Theft Online

Identity theft is a growing threat on the Internet landscape. 9 million identities are stolen in the US every year. Learn how to protect yourself from becoming one of those 9 million. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 10:24AM
Kudos:
1

How Do Cybercriminals Get Caught?

It's a rather long and complicated process with many individuals involved. Here we explain just how cybercriminals get caught. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Oct-2014 | 2:07PM
Kudos:
0

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Feb-2015 | 5:33PM
Kudos:
2

What Happens When Your Identity Is Stolen?

The IRS has announced that it will be notifying taxpayers after third parties gained unauthorized access to information on about 100,000 accounts through the “ Get Transcript ” online application. You can view more about the breach via a statement on the ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
27-May-2015 | 3:05PM
Kudos:
1

Team GhostShell Hacking Group is Back

A group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities. Using a Twitter account, these cybercrimi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Jun-2015 | 12:11PM
Kudos:
1

Thanksgiving- Cybersecurity Technologies We're Thankful for and Why

Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 8:00AM
Kudos:
2

Up To 5 Million VTech User Accounts of Parents and Children May Have Been Compromised in Data Breach

This week, VTech, a global company that manufactures Internet connected learning products for young children announced that they have been involved in a massive data breach. The company’s learning devices, such as a smartwatch and smartphone, allow kids t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Dec-2015 | 2:13PM
Kudos:
1

What Is Malvertising?

Malvertising is a shortened term for malicious advertising, and is defined as using online advertising to spread malware. Malvertising requires placing malware-laden advertisements on legitimate web pages and through authentic online advertising networks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
18-Nov-2015 | 2:27PM
Kudos:
1

A Cold Calling Scammer- a Personal Experience

I was sitting in my home office when my home phone line rang. It was late. 10:30pm to be exact, but I often use this quiet time, after my kids have gone to bed, to catch up on email. ...
Blog Post
Author:
gerry_egan Employee
Posted:
09-Dec-2015 | 2:37PM
Comments:
3
Kudos:
3

7 Dos and Don’ts of Secure Online Tax Filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it. As online fraud continues to gr ...
Blog Post
Author:
Posted:
28-Jan-2016 | 10:52AM
Kudos:
1

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 3:07PM
Comments:
1
Kudos:
1

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo.  With the advent of easy digital photography, however, connecting extra info ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Feb-2016 | 2:40PM
Comments:
1
Kudos:
1

What Personal Information Should You Safeguard?

Português Español Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Feb-2016 | 12:40PM
Kudos:
1

Internet Scams Based on Current Events Plague Users

It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel empathy for the victims of tragic current events, or even ...
Blog Post
Author:
J2K2 Employee
Posted:
19-Feb-2016 | 1:35PM
Kudos:
2

The Dos and Don’ts of Using Public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our lapto ...
Blog Post
Author:
J2K2 Employee
Posted:
22-Mar-2016 | 2:16PM
Comments:
1
Kudos:
3

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies ...
Blog Post
Author:
SavvyMediaGal Employee
Posted:
08-Jun-2016 | 5:33AM
Kudos:
2

Don’t Let Social Network Sharing Ruin Your Celebrations

Celebrating life’s milestone events is something we cherish. Births, weddings, and anniversaries. Even a death, although sad, can be a reason to celebrate the life of a loved one. And in most cases, as we share news of these milestones with friends, famil ...
Blog Post
Author:
J2K2 Employee
Posted:
02-Jun-2016 | 8:00AM
Kudos:
1

The Day I Thought Cybercriminals Left Me For Dead

Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jun-2016 | 2:35PM
Kudos:
1

Symantec Discovery Leads to Malicious App That Steals Viber Photos and Videos

Researchers at Symantec have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber. The malicious app, Beaver Gang Counter, which was available on Google Play, positions itself as a scor ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Jun-2016 | 9:00AM
Comments:
3
Kudos:
0

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
29-Jun-2016 | 10:00AM
Kudos:
0

12 Days of Norton Tips

We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer, And make sure this season is the best of your year. ...
Blog Post
Author:
J2K2 Employee
Posted:
21-Nov-2016 | 12:23PM
Kudos:
0

Yahoo Announces Breach of One Billion Accounts

Hot on the heels of Yahoo announcing a data breach of 500 million user accounts in September, the company has announced that they have suffered another breach of one billion accounts. Yes, you read that correctly- one BILLION accounts. As Yahoo previously ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Dec-2016 | 4:09PM
Comments:
17
Kudos:
4

Is Paying For Antivirus Software Worth It?

Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. The price of digital safety It’s hard to put a price tag on digital safety. Take malw ...
Blog Post
Author:
Posted:
14-Jan-2017 | 8:05AM
Kudos:
2