Quantcast
Channel: Norton - 博客 - Norton Protection Blog
Browsing latest articles
Browse All 199 View Live

Image may be NSFW.
Clik here to view.

Pokémon Go Cyber Security and Privacy Guidelines

In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my...

View Article


Image may be NSFW.
Clik here to view.

Pokémon Go Parents Guide for Children

One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play...

View Article


Image may be NSFW.
Clik here to view.

Pokémon Go Real World Risks and Safety Tips

The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game...

View Article

Image may be NSFW.
Clik here to view.

What Is a No-Log VPN Network?

Virtual private networks, or VPNs, allow people to use public Wi-Fi hotspots safely by encoding, or encrypting, the data sent or received during the user’s online session. This shields users’ privacy...

View Article

Image may be NSFW.
Clik here to view.

How to Securely Set Up Your Home Wi-Fi Router

Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you...

View Article


Image may be NSFW.
Clik here to view.

Norton @ DefCon

This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to...

View Article

Image may be NSFW.
Clik here to view.

What Is Smishing?

A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of...

View Article

Image may be NSFW.
Clik here to view.

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I...

View Article


Image may be NSFW.
Clik here to view.

How To Talk to Your Kids About Cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...

View Article


Image may be NSFW.
Clik here to view.

Pop-Cultural Relevance of Hacking in Today's World

When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime...

View Article

Image may be NSFW.
Clik here to view.

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional...

View Article

Image may be NSFW.
Clik here to view.

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...

View Article

Image may be NSFW.
Clik here to view.

Can a mobile phone battery track you?

With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to...

View Article


Image may be NSFW.
Clik here to view.

轻松享受数字生活:有效保护家人在线安全的 10 大互联网安全规则

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...

View Article

Image may be NSFW.
Clik here to view.

How a VPN Can Help Hide Your Search History

Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search...

View Article


Image may be NSFW.
Clik here to view.

Can the Elections Get Hacked?

The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can...

View Article

Image may be NSFW.
Clik here to view.

The Basic Steps to Online Safety and Security- NCSAM Week 1

Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age,...

View Article


Online Harassment: Halting a Disturbing 'New Normal'

A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne...

View Article

Image may be NSFW.
Clik here to view.

From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in...

Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits…...

View Article

Image may be NSFW.
Clik here to view.

Safe Online Shopping Tips for the Holiday Season

The shopping season is coming and if you’re a modern consumer you’re going to be doing at least some of your holiday shopping online. The problem is that some of the most dangerous places on the web...

View Article

Image may be NSFW.
Clik here to view.

How To Recognize and Protect Yourself from Cybercrime

Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more...

View Article


Image may be NSFW.
Clik here to view.

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected...

View Article


Image may be NSFW.
Clik here to view.

Holiday Travelers' Tips for Device Security in Airports

As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports — most likely with their trusty mobile devices in hand and...

View Article

Image may be NSFW.
Clik here to view.

12 Days of Norton Tips

On the first day of Christmas, my good friend shared with me: A social network scam that almost took my money.Our social networks can multiply the cheer of the holiday season. What’s nicer than a...

View Article

Image may be NSFW.
Clik here to view.

Happy Thanksgiving! Celebrating the Things That Keep us Safe

SaveSave

View Article


Image may be NSFW.
Clik here to view.

Happy Halloween From Norton by Symantec!

View Article

Image may be NSFW.
Clik here to view.

How To Set Up and Secure Your New Tech

With the Holiday festivities upon us, it’s likely that Internet connected gadgets have topped many people’s lists of things to buy. As exciting as these gifts are to give, if you end up on the...

View Article

Image may be NSFW.
Clik here to view.

The 12 Days of Norton

Welcome to The 12 Days of Norton!  We believe that a secure holiday is a happy holiday, so"We’re counting down days until Christmas is here, And gifting you cool security tips to be of good cheer,And...

View Article

Image may be NSFW.
Clik here to view.

Online Christmas Shopping: Naughty or Nice?

Surprisingly, in this always-connected day and age, people surveyed by Norton in Australia and New Zealand said they plan to do less than 40% of their Christmas shopping online.Norton released results...

View Article



Image may be NSFW.
Clik here to view.

Data Breaches That Made Headlines in 2016

980 data breaches occurred in 2016. That left an approximate 35,233,317 known records exposed. Over the years, data breaches have become more sophisticated, and cybercriminals target both large...

View Article

Image may be NSFW.
Clik here to view.

Norton Introduces Elegantly Designed Norton Core- A Digital Safety Solution...

New High-Performance Wi-Fi Router, Built from The Ground Up to Secure Home Networks and IoT Devices, Will Come Bundled with Subscription to Award-Winning Norton SecurityMountain View, Calif. – Jan. 3,...

View Article

Image may be NSFW.
Clik here to view.

Top Ten Cyber Security Predictions for 2017

The Internet threat landscape was booming last year for cybercriminals. We reported on 54 major events in 2016. And that’s not counting the little stuff. The threat landscape shifted slightly in the...

View Article

Image may be NSFW.
Clik here to view.

Is Paying For Antivirus Software Worth It?

Our daily and digital lives overlap each other. Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second.The price of digital safetyIt’s...

View Article


Image may be NSFW.
Clik here to view.

The Personal Impact of Cybercrime

Fifty-one percent of people think that over the past five years it’s become harder to stay safe and secure online than in the real world. Yet, 689 million people in 21 countries experienced cybercrime...

View Article

Image may be NSFW.
Clik here to view.

Why Your Online Privacy Matters

To understand the importance of privacy in the digital age, one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything...

View Article

Image may be NSFW.
Clik here to view.

How to Improve Your Wi-Fi Signal at Home

Every day more of the country gets better, faster Wi-Fi coverage. But that doesn’t stop your signal at home from dropping off or grinding to a halt every now and then. Here are the latest tips from our...

View Article


Image may be NSFW.
Clik here to view.

LifeLock joins consumer business unit at Symantec

We announced some exciting news in November about Symantec’s plans to acquire LifeLock, and now I’m happy to share that the deal has closed and our integration with LifeLock, and its enterprise...

View Article


Image may be NSFW.
Clik here to view.

The smarter home: How to cut the cord with a smart TV

Have you heard about cutting the cord? It’s a way to replace cable television that has grown in popularity as more people are upgrading to Smart TVs and video streaming devices. Renting equipment from...

View Article

Image may be NSFW.
Clik here to view.

Love, lies and online dating

It’s the age of modern romance. The approach of finding a partner has changed over a period of time. Busy lives and innovative technology have given rise to apps and websites that has increased the...

View Article

Image may be NSFW.
Clik here to view.

Why clean computing matters

February 13th is National Clean out Your Computer day, and there’s good reason behind it. When you “clean” your computer, you don’t just dust off the keyboard and wipe fingerprints from the screen. You...

View Article

Image may be NSFW.
Clik here to view.

The ultimate guide to online dating

Online dating is as normal to life as is online shopping. Believe it or not, online dating has been around for 20 years, and as a result, cybercriminals are finding big money in people looking for...

View Article


Image may be NSFW.
Clik here to view.

Is Your Identity Exposed? Tips to Secure Your Identity Online

Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a...

View Article

Image may be NSFW.
Clik here to view.

How to Avoid Public Wi-Fi Woes on a Business Trip

Now that summer is here, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country...

View Article


Image may be NSFW.
Clik here to view.

The Day I Thought Cybercriminals Left Me For Dead

Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our...

View Article

Image may be NSFW.
Clik here to view.

How to Stay Safe When File Sharing Online

File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications...

View Article


Image may be NSFW.
Clik here to view.

#30SecTech: What Is a VPN?

There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or...

View Article

Image may be NSFW.
Clik here to view.

Paying Friends Through a Mobile Payment App

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but...

View Article

Image may be NSFW.
Clik here to view.

How Safe Is Surfing on 4G vs. Wi-Fi?

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the...

View Article

Image may be NSFW.
Clik here to view.

Watch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That...

Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the...

View Article


Image may be NSFW.
Clik here to view.

How Facial Recognition Software Works

If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software...

View Article

Browsing latest articles
Browse All 199 View Live