• Todas las Comunidades
    • Todas las Comunidades
    • Foros
    • Ideas
    • Blogs
Avanzado

Buscar

Resultados de la búsqueda

How Safe Is Surfing on 4G vs. Wi-Fi?

日本語 You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way? Truth be told, nothing is 100% safe. How ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
04-Jul-2016 | 6:00AM
Comentarios:
1
Kudos:
1

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24 ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
11-Ago-2016 | 3:27PM
Kudos:
1

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
09-Ago-2016 | 8:33AM
Kudos:
2

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
09-Ago-2016 | 10:48AM
Kudos:
3

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
01-Jul-2016 | 10:30AM
Kudos:
1

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
29-Jun-2016 | 10:00AM
Kudos:
0

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know what threats they face so you may deal with them accordi ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
04-Jun-2016 | 12:00PM
Comentarios:
1
Kudos:
0

Teach Your Kids to Avoid Online Scams

Português Español Surfing the Internet means possible exposure to online scams, something your children might not have any concept of. If you’re allowing them to go online, it’s imperative that you discuss online scams. Such scams come in a variety of gui ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
20-Abr-2016 | 6:49PM
Comentarios:
1
Kudos:
1

How To Stay Ahead of Zero Day Vulnerabilities

Zero Day Vulnerabilities are a newly discovered software vulnerabilities that are unknown to the manufacturer. A software vulnerability is a weakness in the software where cybercriminals can sneak malware onto your computer. In these cases hackers will ru ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
11-Mayo-2016 | 2:48PM
Kudos:
1

How to Let Go of Old Tech Securely and Responsibly

According to several studies on cost of ownership, users should replace their computer devices every four years. Not everyone will need to upgrade his or her computer every four years, but it’s a good rule to follow to ensure your data is safe and properl ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
29-Feb-2016 | 3:30PM
Kudos:
2

How Can I Tell If I Have Malware and What Can I Do About It?

Português Español Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to describe strange symptoms or behaviors enc ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
14-Abr-2016 | 10:48PM
Kudos:
0

Symantec Financial Threats Report Gives Consumers Security Tips

It’s tax season, so our finances are top of mind for many of us. Cybercriminals are thinking about our money, too. After all, most cybercrimes are committed for monetary gain. According to the Symantec report titled “ Financial Threats 2015,” cyber thieve ...
Blog Post
Autor:
J2K2 Employee
Posted:
24-Mar-2016 | 8:08AM
Kudos:
2

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very frustrating to find out that, despite your best efforts, the ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
12-Abr-2016 | 10:46PM
Comentarios:
1
Kudos:
1

Sneaky Spammer Tactics and How To Avoid Them

Português Español Spam is a problem on the Internet, coming at us from just about every angle of the online space. Some spammers develop sophisticated, well-planned strategies, while others can be sloppy and still drive results. Either way, spam tactics c ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
14-Mar-2016 | 12:30PM
Kudos:
0

Why March Madness Is Bad for Business

Every spring the NCAA college basketball tournament — known as March Madness — turns workplaces into play spaces. Betting on brackets and watching games seem more suited to sports bars, but since many of the games are played during the workday, it’s not u ...
Blog Post
Autor:
J2K2 Employee
Posted:
25-Mar-2016 | 5:44PM
Kudos:
4

5 Ways You Can Help Yourself Stay Secure Online

When you’re using the Internet, your Internet security suite can only go so far to protect you from potential dangers like spyware, ransomware and malware. You have to do some of the work yourself, because there are some threats that no Internet security ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
22-Mar-2016 | 1:00PM
Kudos:
0

Software Terms of Service and Privacy Policies Explained

Português Español If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing th ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
10-Feb-2016 | 2:25PM
Kudos:
0

How to Spot Baseball Spring Training Scams

As winter drags on, almost everyone starts to look forward to spring — but perhaps no group looks forward to March quite as much as true-blue baseball fans. After all, its arrival means Cactus League and Grapefruit League spring training baseball camps op ...
Blog Post
Autor:
J2K2 Employee
Posted:
14-Mar-2016 | 11:41AM
Kudos:
2

What Are Browser Hijackers?

A browser hijacker is defined as a “form of unwanted software that modifies a web browser’s settings without the user’s permission.” The result is the placement of unwanted advertising into the browser, and possibly the replacement of an existing home pag ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
10-Mar-2016 | 10:38AM
Kudos:
0

5 Tips to Protect Yourself from Online Travel Booking Scams

Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of phony travel booking websites is growing because they’re so ...
Blog Post
Autor:
J2K2 Employee
Posted:
08-Mar-2016 | 8:41AM
Kudos:
3

7 Ways to Ensure Your Data Is Safe During Vacation

It’s barely spring and already you’re thinking about vacation. Where will you go? What will you do? Who will you meet? Vacations are an exciting, happy time for people to get away and avoid the everyday worries of home. But the fun and leisure comes to a ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
08-Mar-2016 | 11:44AM
Kudos:
1

Internet Scams Based on Current Events Plague Users

It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel empathy for the victims of tragic current events, or even ...
Blog Post
Autor:
J2K2 Employee
Posted:
19-Feb-2016 | 1:35PM
Kudos:
2

Parents Best Practices to Social Media Security

With connected kids today, it can be a full-time job for parents to be able to monitor their online activities. We’ve put together some helpful tips and guidelines so that you and your whole family can enjoy social media safely. ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
17-Ene-2016 | 9:43AM
Kudos:
0

What Are Bots?

Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of malware. Malware bots are used to gain total control over ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
03-Mar-2016 | 1:33PM
Kudos:
0

How to Prepare a Smartphone or Tablet for Vacation

There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, a ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
02-Mar-2016 | 3:41PM
Kudos:
1

What Are Cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
29-Feb-2016 | 9:30AM
Kudos:
0

Encryption: How To Utilize it Online and Why It’s Important

Encryption is the process of protecting personal data, often with a form of “secret code,” so that it cannot be read by anyone who doesn’t have the code key.  Today, huge amounts of personal information are managed online, via computer applications, and s ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
02-Nov-2015 | 9:42AM
Kudos:
1

Good Cyber Hygiene

Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart device ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
26-Feb-2016 | 6:46PM
Comentarios:
1
Kudos:
2

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve the device, or at least keep your data protected. You ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
24-Feb-2016 | 6:46PM
Comentarios:
1
Kudos:
1

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that ...
Blog Post
Autor:
Nadia_Kovacs Employee
Posted:
22-Feb-2016 | 3:00PM
Kudos:
1