Cybercrime Survival Toolkit- Surviving The Most Dangerous Town On The Internet

[norton-video:youtube:1]

As the old adage goes- knowledge is power, and that knowledge is the most powerful defense you have against the threats on the Internet landscape. Now that you’ve seen the film (and just in case you haven’t: mostdangeroustown.com), the fight against cybercrime may seem like an uphill battle, but as hackers are getting smarter, you can become smarter as well. We’ve created this “Cybercrime Survival Kit” to help educate users about the types of threats on the Internet, what they can do and how you can protect yourself against scams, malware, data breaches and more.

 

Take a Deeper Dive on the Subjects Mentioned in the Film:

What is the Difference Between Black, White and Grey Hat Hackers?
What is Social Engineering
Protecting Passwords
How Do Cybercriminals Make Money
What Happens When Your Identity Is Stolen?
Selling the Brooklyn Bridge (Avoiding Online Scams)
The Connected Life- Just How Safe Is Convenience?

 

Malware can be a tricky concept to wrap your head around, due to all the different variants on the threat landscape. Additionally, there’s so many different ways that malware can get onto your computer, it can be difficult to figure out how to stay protected. With our Malware 101 series, you can learn about the most commonly seen types of malware, what it can do to your computer and how it gains access to them.
Malware 101: What Is Malware?                                                   
Malware 101: How Do I Get Malware on My Computer? Part One                    
Malware 101: How Do I Get Malware on My Computer? Part Two                   

 

 

There is an abundance of scams and fraud being performed online. The best rule of thumb is that if it sounds too good to be true then it probably is. You can explore the world of scammers and the different kinds of tactics they use as well as learn how to identify them and stay safe.

How To Protect Yourself From Phishing Scams                                        
Mobile Scams: How-to Identify Them and Protect Yourself                               
Social Media Scams Based on Current Events                                          

 

As Iceman said, most of the passwords he encountered were “123456.” Don’t be that person. Learn how to create stronger passwords, and add another layer of security to your account by adding Two-factor authentication.
The Importance of Two-Factor Authentication
How To Choose a Secure Password           

 

Data breaches aren’t going away any time soon. According to Symantec’s 2015 Internet Security Threat Report the number of data breaches in 2014 increased by 23 percent. Learns the in’s and out’s of data breaches, how to stay protected from them and what to do in the case that you fall victim to one.
What To Do In The Event Of A Bank Breach                                
What to Do in the Event of a Major Data Breach                         
My Account May Have Been Hacked—What To Do Now?                       
Data Breach - The Best Defense is Vigilance                                 

According to the FTC 9 million identities are stolen in the United States every year. Most of the private information collected from victims is used to aid in identity theft. Learn how to keep your personal information on lockdown.
How To Avoid Identity Theft Online                                              

Cybercrime isn’t happing only on computers. There are now over than 1 million malicious apps in existence, all aimed at trying to capture your private information. Since we do so much on our smartphones now, they have become a lucrative target to cybercriminals. Learn about the different threats on the mobile landscape, and how to identify them and protect yourself. 
Cyber Security Concerns and Smartphones                                             
Exactly How Free Is That Free App?                                              
How to Spot a Fake Android App                           

Need a quick-fix lesson? Check out our #30SecTech video series:
What Is a Virus #30SecTech                                                                       
How do Zero-Day Vulnerabilities work: #30SecTech                               
Get to Know Firewalls 101 - #30SecTech                                     
Point of Sale Malware Attacks Explained - #30SecTech              
Securing the Internet of Things - #30SecTech video                              
Cookies and Your Online Privacy: #30SecTech