Pokémon Go Cyber Security and Privacy Guidelines
In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my...
View ArticlePokémon Go Parents Guide for Children
One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play...
View ArticlePokémon Go Real World Risks and Safety Tips
The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game...
View ArticleWhat Is a No-Log VPN Network?
Virtual private networks, or VPNs, allow people to use public Wi-Fi hotspots safely by encoding, or encrypting, the data sent or received during the user’s online session. This shields users’ privacy...
View ArticleHow to Securely Set Up Your Home Wi-Fi Router
Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you...
View ArticleNorton @ DefCon
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to...
View ArticleWhat Is Smishing?
A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of...
View ArticleDefCon 24- Hacking to Make the World a Better Place
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I...
View ArticleHow To Talk to Your Kids About Cyberbullying
Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...
View ArticlePop-Cultural Relevance of Hacking in Today's World
When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime...
View ArticleWhat Is VoIP?
VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional...
View ArticleKeep Your Home Wi-Fi Safe in 7 Simple Steps
It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...
View ArticleCan a mobile phone battery track you?
With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to...
View Article轻松享受数字生活:有效保护家人在线安全的 10 大互联网安全规则
Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...
View ArticleHow a VPN Can Help Hide Your Search History
Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search...
View ArticleCan the Elections Get Hacked?
The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can...
View ArticleThe Basic Steps to Online Safety and Security- NCSAM Week 1
Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age,...
View ArticleOnline Harassment: Halting a Disturbing 'New Normal'
A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne...
View ArticleFrom the Break Room to the Boardroom: Creating a Culture of Cybersecurity in...
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits…...
View ArticleSafe Online Shopping Tips for the Holiday Season
The shopping season is coming and if you’re a modern consumer you’re going to be doing at least some of your holiday shopping online. The problem is that some of the most dangerous places on the web...
View ArticleHow To Recognize and Protect Yourself from Cybercrime
Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more...
View ArticleThe Smarter Home: How to Create a Smart Home
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected...
View ArticleHoliday Travelers' Tips for Device Security in Airports
As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and...
View Article12 Days of Norton Tips
On the first day of Christmas, my good friend shared with me: A social network scam that almost took my money.Our social networks can multiply the cheer of the holiday season. What’s nicer than a...
View ArticleHow To Set Up and Secure Your New Tech
With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped many people’s lists of things to buy. As exciting as these gifts are to give, if you end up on the...
View ArticleThe 12 Days of Norton
Welcome to The 12 Days of Norton! We believe that a secure holiday is a happy holiday, so"We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer,And...
View ArticleOnline Christmas Shopping: Naughty or Nice?
Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online.Norton released results...
View ArticleData Breaches That Made Headlines in 2016
980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large...
View ArticleNorton Introduces Elegantly Designed Norton Core- A Digital Safety Solution...
New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton SecurityMountain View, Calif. – Jan. 3,...
View ArticleTop Ten Cyber Security Predictions for 2017
The Internet threat landscape was booming last year for cybercriminals. We reported on 54 major events in 2016. And that’s not counting the little stuff. The threat landscape shifted slightly in the...
View ArticleIs Paying For Antivirus Software Worth It?
Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second.The price of digital safetyIt’s...
View ArticleThe Personal Impact of Cybercrime
Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime...
View ArticleWhy Your Online Privacy Matters
To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything...
View ArticleHow to Improve Your Wi-Fi Signal at Home
Every day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our...
View ArticleLifeLock joins consumer business unit at Symantec
We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise...
View ArticleThe smarter home: How to cut the cord with a smart TV
Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from...
View ArticleLove, lies and online dating
It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the...
View ArticleWhy clean computing matters
February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You...
View ArticleThe ultimate guide to online dating
Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for...
View ArticleIs Your Identity Exposed? Tips to Secure Your Identity Online
Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a...
View ArticleHow to Avoid Public Wi-Fi Woes on a Business Trip
Now that summer is here, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country...
View ArticleThe Day I Thought Cybercriminals Left Me For Dead
Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our...
View ArticleHow to Stay Safe When File Sharing Online
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications...
View Article#30SecTech: What Is a VPN?
There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or...
View ArticlePaying Friends Through a Mobile Payment App
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but...
View ArticleHow Safe Is Surfing on 4G vs. Wi-Fi?
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the...
View ArticleWatch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That...
Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the...
View ArticleHow Facial Recognition Software Works
If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software...
View Article