Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for love. However, these aren’t issues that should deter you from fishing in the sea of online dating.
In this guide, we will take you step-by-step through the entire online dating process. From finding the best dating site, protecting your digital privacy, all the way up to that first date, we’ve got you covered.
Choosing the right site
The cyber-sea of love can be overwhelming to navigate...
February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You also pay attention to the state of the hard drive, updating software and removing old programs.
Why is cleaning up your computer important?
Clean software helps protect your data. Internet security software and regular program updates help ensure that viruses, malware, and remote “hackers” stay out of your system. When you maintain your files by backing them up, deleting unused programs,...
It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the probability of finding a suitable companion. As in finding love the traditional way, online dating too also has its pros and cons.
A recent survey by Norton among men and women in Australia and New Zealand revealed that almost a quarter of the people who have tried online dating and no longer have a profile have found their partner online. The survey* conducted among New Zealanders and Austra...
We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise subsidiary ID Analytics, is underway.
There is a lot of passion and excitement from our combined team around the promise and potential we have together to provide a comprehensive digital safety platform that gives you, our customers, a greater sense of security with the addition of identity theft protection expertise.
With this acquisition, Symantec is redefining what safety means in a connected w...
Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from cable service providers can be costly, and for many cutting the cord can also cut the bill. If you’re on the fence here are a few tips to get you started and most importantly home network security best practices to consider. Smart TVs are making headlines for faulty security and privacy risks. So when you cut the cord, stream smarter and more secure. Here’s how:
Step one: A smart TV
Every day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your home Wi-Fi service.
Location, location, location
Wi-Fi waves are a lot shorter than the ones used for radio and mobile phone data, so most routers can probably manage about 150 feet, while a radio mast can probably manage several miles.
Many routers transmit downwards or horizontally rather than upwards, so you’ll want to make sure your router ...
To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide.
What Is Privacy?
Privacy is closing your bedroom curtains when getting ready for bed. Privacy is visiting with your doctor behind closed doors. While in real life this type of privacy comes naturally, with little thought, in the digital s...
Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime within the last year alone. The reason for this staggering number is simple. Most people don’t take the right precautions to protect their digital lives. While some are unaware of online dangers others think it can be dealt with after it happens. The truth remains that cybercrime is evolving rapidly and impacting the daily and digital lives of people.
Revealed in a survey conducted last ye...
Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second.
The price of digital safety
It’s hard to put a price tag on digital safety. Take malware for example. These sneaky little codes find their way into your devices and transmit your personal information to computers far away that are operated by fraudsters. The end result could translate into anything from cybercriminals draining your bank account to holding all your information hostage by freezing your device and asking ...
The Internet threat landscape was booming last year for cybercriminals. We reported on 54 major events in 2016. And that’s not counting the little stuff. The threat landscape shifted slightly in the past year, and we have seen some new trends. However, some of the older ones are sticking around and still going strong.
New Threat Predictions for 2017
1. The Internet of Things
The First Major Attack on IoT Devices
2016 was the breakout year for attacks on IoT devices. In October, the first massive cyber attack involving IoT devices, such as webcams and DVRs, occurred. The Mirai B...
New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton Security
Mountain View, Calif. – Jan. 3, 2017 – Building on a heritage of industry-leading and award-winning security software, Norton by Symantec (NASDAQ: SYMC) today changed the future of digital safety with the announcement of Norton Core. Norton Core is a uniquely-designed, high-performance Wi-Fi router that is available for pre-orders today and will change the way people secure their connected homes.
Today’s home networks, b...
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.
What Is a Smart Home?
While the term “Smart Home” has been used a lot these days, especially with the rapid emergence of ...
980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large corporations and small businesses.
2016 saw a string of data breaches that left sensitive information of millions of people at the mercy of cybercriminals. In addition to financial consequences, these data breaches ruined customer trust and the reputation of the companies in question.
As we look back at 2016 here are some of the most impactful data breaches that shook the world.
117 Million Lin...
Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online.
Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others. However, the survey results may indicate those promotions are not enough to encourage security-concerned shoppers to buy online.
While concerns about online shopping risks are high, only 23 % of people in Australia and 20% of peop...
Welcome to The 12 Days of Norton!
We believe that a secure holiday is a happy holiday, so
"We’re counting down days until Christmas is here,
And gifting you cool security tips to be of good cheer,And make sure this season is the best of your year."
We hope you'll join us every day until Christmas to learn some tips that will help keep your digital life secure so you can enjoy the joys of this holiday season.
On the first day of Christmas, a friend shared with me:
A social scam that nearly took all my money.
Our social networks can multiply the cheer of the holiday season. What’s nic...
Congratulations on your new device! You’re likely caught up in the fun of having a new gadget, and probably shopping for a shiny (or sparkly) new case. While a case protects your device from nature and clumsy hands, it doesn’t make your phone absolutely safe. Why? Because it doesn’t protect what matters most—your information.
Think about all that you do on your devices—sharing precious photos, ordering your favorite latte, and shopping. With the rise of cybercrime and the high costs associated with it, it’s even more important that you learn how to protect what matters most—the personal i...
On the first day of Christmas, my good friend shared with me:
A social network scam that almost took my money.
Our social networks can multiply the cheer of the holiday season. What’s nicer than a platform that allows us to interact easily with faraway loved ones, often in real time? However, social networks can also have their naughty — and downright dangerous — side during the holidays. Follow these tips to stay safe from social networking scams:
Beware Video Links
There’s a reason cat videos are so popular on social media — cats are cute! But watching cats playing with Christmas tree...
As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Grandma’s house, here’s a checklist to keep smartphones, tablets, and laptops safe while spending time in an airport.
Get Smart Before You Leave Home
When you check in online the day before your flight, take some time to check off a few more pre-travel to-dos.
Make sure ...
Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more concerns than just basic financial ones. When you see the full list of cybercrimes out there, you might be tempted to stop using the Internet entirely. However, such drastic measures are not necessary. All you need to do to protect yourself is take some basic precautions and know who to contact when you see others engaged in criminal activities online.
What Is Cybercrime?
Cybercrime is any ...
The holidays are just around the corner, and that means many of us will be making purchases online to avoid large crowds and busy mall traffic. While online shopping has made our lives easier, it also exposes new weaknesses with the information we use to make those very purchases.
The holiday season is a lucrative time for online retailers and cybercriminals see this as an opportunity to profit as well. In fact, Norton Safe Web found that shopping sites are amongst the top ten most frequently exploited websites. An additional concern is bogus e-commerce websites, which are made to look le...
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits… all of these need to take an interest in cybersecurity or pay the price. It’s a matter or success, but also a matter of national security. Those working in critical infrastructure have a special obligation to make sure that they’re securing the workplace. Here are some of the best ways to create a culture of cybersecurity where you work.
It All Starts With Education and Training
A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.
On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne hardly seems a likely candidate for cyberbullying.
The former Parramatta Eels, San Francisco 49ers and Fiji rugby sevens superstar holds an elite place in Australian rugby league history, having been awarded the Dally M Medal twice as the NRL's player of the year. He has represented Australia and Fiji and in 2009 was also named the Rugby League International Federation’s International Pla...
Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age, that is not the case. The threat landscape has evolved just as our technology has. The more devices that are out there equal more things for cybercriminals to attack.
Personal cybersecurity is a now a multi-pronged approach. It’s not as simple as installing antivirus on a computer anymore. A good foundation to personal cybersecurity is knowledge. Since threats don’t come solely in digital f...
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can we possibly know? A Symantec security expert recently demonstrated just what a motivated hacker can do to undermine the election by hacking an electronic voting machine.
Can Hackers Hack the Election?
At the Black Hat convention this year, Symantec’s Brian Varner demonstrated a security flaw in an electronic voting machine and the smart card a voter would use to place their vote. Using...
Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds.
But did you ever stop to wonder what happens to your searches? Sure, you can clear your cookies and search history from your browser, but chances are that information has already been recorded somewhere. And when you think about it, that information reveals a lot about you.
Maybe you’re thinking of traveling to Hawaii, or are worried about ...
With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to track people online. In some instances, this can be used to upsell services purchased through a mobile app, ride sharing “surge pricing” for example. How else can this be used? Here’s what you need to know about the privacy and security issues raised.
What is the Battery Status API
The Battery Status API was introduced in HTML5, and this was intended to give site owners information so th...
インターネットは 21 世紀の必需品となりつつあります。あらゆるデバイスがインターネットに接続されてモバイル活用が大幅に進み、生産性の向上につながっています。インターネットは技術に詳しい人だけのものではなく、すべての人のものであると言っても過言ではありません。ただし、保護されていない状態だと、インターネットは悪意を持つ人による悪質な活動の場となりえます。
例として、自宅のワイヤレスネットワークを取り上げます。家族のほぼ全員がノート PC、デスクトップ PC、スマートフォン、タブレットからそのネットワークにアクセスします。さらに、モノのインターネット（IoT）により、自宅のあらゆるものが Wi-Fi にアクセスします。ホームネットワークに小さな脆弱性があれば、その Wi-Fi にアクセスしているほぼすべてのデバイスに犯罪者がアクセスできる可能性があります。これは、銀行口座、クレジットカードの詳細、子どもの安全など、多くのものを危険にさらす可能性があります。
次のヒントは、自宅の Wi-Fi ネットワークを不正アクセスから保護するのに役立ちます。
1.自宅の Wi-Fi のデフォルト名を変更する
自宅の Wi-Fi を保護する最初のステップは、SSID（サービスセット識別子）の変更です。SSID はネットワークの名前です。多くの製造元は、すべてのワイヤレスルー...
現代の子どもたちは、昔に比べて多種多様な情報に接することができます。インターネットのおかげで、情報量が豊富になり、子どもたちの生活は見違えるほど豊かになりました。しかし、インターネットには、あなた自身だけでなく、かけがえのない家族にも危害を加える危険性が潜んでいます。企業がネット犯罪の標的になったり、友達の電子メールや SNS のアカウントが乗っ取られたりする話も、もはや日常茶飯事であり、こうした危険性は身近なものとなっているのです。
ここでは、家族が使用しているデバイスを保護し、インターネットで好きなことを好きなだけ楽しむための 10 個のヒントを紹介します。
2. フィッシング詐欺に警戒すること。あなた自身が、銀行や友人を騙った電子メールに含まれている URL をクリックするこ...
When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime wasn’t quite the household name it is today, therefore, there was a wide unfamiliarity of it within the public eye.
Directors and writers have struggled with how to portray hacking in film simply because the act of hacking in real life is not very interesting or visually compelling. It’s just lines of code scrolling down a computer screen. In order to keep the viewer entertained they used chee...
Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children insecure. What makes cyberbullying a little more intense than bullying is it not limited to the school yard.
According to a 2015 survey 34.4% of students between the ages of 11 and 15 have been cyberbullied. This includes children who have been threatened online to be hurt, had rumors spread about them, or had mean and hurtful comments or pictures of them online.
This onslaught of hateful messag...
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
Put simply, smishing is any kind of phishing that involves a text message. Often times, this form of phishing involves a text message in an SMS or a phone number. Smishing is particularly scary because sometimes people tend to be more inclined to trust a text message than an email. Most people a...
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to explore the latest threats that are currently on the Internet, and to learn how to get ahead of them. This year, the conference had a record-breaking attendance of 22,000 people ranging from hackers, coders, journalists (me!), security researchers and even federal government employees.
This was my first time attending this conference, and although I did my research on it, it was beyond my e...
無線インターネットアクセスは、現在最も便利な技術の 1 つです。ところが、自宅の無線ルーターは、ハッカーのアクセスポイントにもなり得るのです。Wi-Fi ルーターのセキュリティをきちんと設定しておかないと、第三者が無線対応デバイスからホームネットワークに侵入する可能性があります。その結果、電子メールや銀行情報、さらにはスマートホームの毎日のスケジュールの詳細までもが犯罪者に筒抜けになってしまいます。
1.どの無線ルーターにも 管理画面にアクセスする IP アドレスが設定されています。取扱説明書を紛失した場合でも、ルーターのモデル番号でオンライン検索すれば見つかる可能性があります。
Many VPN providers safeguard their customers’ anonymity by offering a no-log network, meaning that they do not collect, or “log,” any information transmitted through the network. They don’t save information about your personal details, where you go online, what you download, or what you search for. Therefore your privacy and anonymity are protected from everybody — even your VPN provider.
このゲームの素晴らしい点の 1 つが子供も大人も楽しめるということです。そこで、一番のお勧めとして、お子様と一緒にプレイするのはいかがでしょうか。
Pokémon GO の話題は、何らかの形で耳にしたことがあるのではないでしょうか。この最新アプリは至る所でスマートフォンで使われています。初めて話を聞いたとき、サイバーセキュリティに高い関心を持っている私は好奇心をそそられました。すぐさまこのゲームの仕組みや遊び方、ゲームに伴う潜在的なセキュリティリスクの調査に取り掛かりました。
まず大切なのは、このゲームはよくあるスマートフォン用ゲームとは違うということをしっかり理解することです。Pokémon GO には実生活とテクノロジーを融合させた拡張現実（AR）というテクノロジーが使われています。多数の層に分かれており、リアルタイムの GPS ロケーション、ジオキャッシング技術、ユーザーの周りの現実の世界を利用します。このアプリを使う際には、作用する要素がたくさんあります。その特徴を徹底的に調査し、ゲームをするときのサイバー領域と実世界のリスク、そして子供たちの安全性について考察していきます。
正規の Pokémon GO アプリが配信されてからわずか数日で、Proofpoint 社の研究員がトロイの木馬が仕込まれたバージ...
If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software in action. Here’s what you need to know about this emerging technology.
How Facial Recognition Software Works
You’ve never given much thought to how you recognize a face, and probably even less to how a computer would do it. Still, it’s not news that human faces have certain qualities you recognize. The spacing of eyes on a face, the position and width of a nose, the shape of a hairline and ...
Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu.
You may have heard about the Stuxnet virus in the media over the years. However, brief news reports don’t even begin to uncover the darkness of this threat. In “Zero Days,” director Alex Gibney takes a deeper look at the sophisticated piece of weapons-grade malware that destroyed a part of an Iranian nuclear facility, as well as help facilitate espionage by spying on its target.
This thrilling documentary discusses the complexity of the virus with Sy...
正直に言うと、100% 安全なものはありません。ただし、セキュリティを強化して 100% にできるだけ近づける方法はあります。まず、それぞれの技術の概要とリスクについて理解することから始めましょう。
モバイルデバイスをインターネットに接続する方法を 3 つに分類し、その接続のしくみを説明します。
4G 対応デバイスは、プロバイダのセルラー接続を経由してインターネットに接続できます。自宅または勤務先でのようにインターネットサービスプロバイダを介して接続するのではなく、携帯通信事業者のネットワークに接続します。4G では、信号を受信できる場所であればどこからでもインターネットにアクセスできます。データが暗号化されて送信されるため、4G はフリー Wi-Fi よりも安全です。
・プライベート Wi-Fi 接続
これは、勤務先や自宅で利用されるネットワークの種類です。プライベート Wi-Fi 接続は、適切に設定すれば、アクセスをパスワードで保護し、送受信...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....
ハッカーがフリー Wi-Fi を好むのには、理由があります。セキュリティで保護されていない Wi-Fi ネットワーク上の情報に簡単にアクセスできるからです。カフェや空港でフリー Wi-Fi を利用して電子メールのチェックやネットショッピングを行うと、ネット犯罪者に機密情報や個人情報を盗み見られてしまう危険性があります。
ノートン WiFi プライバシーのような仮想プライベートネットワーク（VPN）なら、フリー Wi-Fi ホットスポットを安全なプライベート接続に変えられます。30 秒程度の短い動画で、VPN が Wi-Fi 利用時のセキュリティをどのように向上させるかご覧ください。
フリー Wi-Fi を使用する危険性について、またフリー Wi-Fi スポットで個人情報を保護する方法について、もっと知りたいですか? フリー Wi-Fiを安全に使用するためのヒントについて、以下のブログをお読みください。
フリー Wi-Fi を利用するときに気をつけること
VPN とは何でしょうか? また公衆 Wi-Fi ではなぜ VPN を使用すべきなのでしょうか?
休暇中のモバイルデバイスやフリー Wi-Fi のセキュリティについてのガイド
フリー Wi-Fi のリスク
4G と Wi-Fi の安...
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications are free and others offer paid subscriptions for larger storage capacity, speedier service or extra security. File sharing is a very common activity for most online users, but file sharing also makes you susceptible to various online threats including identity theft, infection or attack.
If you plan on using file sharing technology be sure personal data and other sensitive materials are secur...
Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our system as deceased for about 20 minutes.” I paused for a moment out of shock, and assured her I was very much alive and well. She went on to explain how she’d never seen anything like it before. As the initial shock wore off, we started to have a bit of a laugh on how bizarre this was.
It wasn’t all giggles. As an unfortunate side effect of me being “dead” for 20 minutes, all of my appointm...
Now that summer is here, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world. According to the quarterly GBTA Sentiment Business Traveler Index, these working travelers face challenges in staying productive on the go — and mobile connectivity is a large factor in the success of a business trip. Although often overlooked, staying secure on public Wi-Fi should also be an important part of business travel.
Wi-Fi All the Time
Because most business is now con...
Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a record number of 9 mega breaches in this year, companies are not required to disclose the full extent of a data breach. The total number of people affected by a data breach and whose identity is compromised as a result could be much greater. A conservative estimate by Symantec accounting for unreported breaches pushes the number of records lost in a data breach to more than a half billion, in ...