Quantcast
Channel: Norton - 博客 - Norton Protection Blog
Browsing all 199 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What is The Deep Dark Web: #30SecTech

[norton-video:youtube-id:A6UeSxetCTQ] There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Best Practices for Employees

Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the small things you can do can go a long way towards protecting your...

View Article


Image may be NSFW.
Clik here to view.

6 Tips To Maintain Your Privacy While Searching For Jobs Online

Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s...

View Article

Image may be NSFW.
Clik here to view.

Telltale Signs an App Is Violating Your Privacy

Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Top Tips for 2016

2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred.We took a look at...

View Article


Image may be NSFW.
Clik here to view.

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims...

View Article

Image may be NSFW.
Clik here to view.

iOS Device Users Should Update to 9.2.1 Now!

iOS device users- update your software now! Apple released an update to iOS 9 this week, which fixes a three-year old cookie theft bug. Cookies are small files that contain various types of data that...

View Article

Image may be NSFW.
Clik here to view.

Technology Usage and the Physical Effects on Your Body

Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the...

View Article


Image may be NSFW.
Clik here to view.

Thousands of Websites Have Been Compromised With Malicious Code

Symantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website. Of the compromised websites, 75 percent...

View Article


Image may be NSFW.
Clik here to view.

The 5 Stages of Phone Loss Grief

It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your...

View Article

Image may be NSFW.
Clik here to view.

Your Identity Is Connected to All of Your Devices. Here's How to Protect It.

You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available...

View Article

Image may be NSFW.
Clik here to view.

PC or Mac: Which Is More Resistant to Cyber Threats?

Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has...

View Article

Image may be NSFW.
Clik here to view.

Variant of Android Ransomware Uses Shady Tactics to Trick Users Into Giving...

Symantec has found a variant of Android ransomware that uses clickjacking tactics to try and trick users into giving the malware device administrator rights.. As well as encrypting files found on the...

View Article


Image may be NSFW.
Clik here to view.

Data Privacy Day 2016: Ten Ways to Keep Your Data Private

The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and...

View Article

Image may be NSFW.
Clik here to view.

7 Dos and Don’ts of Secure Online Tax Filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law...

View Article


Image may be NSFW.
Clik here to view.

What Is a DDoS Attack? - #30SecTech by Norton

[norton-video:youtube-id:AY5MizD_Mv4]A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. When you hear about a website being “brought down by hackers” it...

View Article

Image may be NSFW.
Clik here to view.

8 Cyber Security Tips for Business Travelers

Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because...

View Article


Image may be NSFW.
Clik here to view.

Biometrics How Do They Work? Are They Safe?

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you...

View Article

Image may be NSFW.
Clik here to view.

What Personal Information Should You Safeguard?

Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to...

View Article

Image may be NSFW.
Clik here to view.

Three Easy Steps to Protect Your Android

You could call mobile devices the new frontier for malware. Malware often appears on mobile devices in the form of an app. These apps sometimes include malicious code that makes the app do things it’s...

View Article
Browsing all 199 articles
Browse latest View live