What is The Deep Dark Web: #30SecTech
[norton-video:youtube-id:A6UeSxetCTQ] There are many layers to the Internet that you may not be aware of. There’s the part that everyone sees Facebook, YouTube, Twitter, news websites and everything...
View ArticleCyber Security Best Practices for Employees
Employees are on the front lines of information security. The more that can be done to regularly educate yourself of the small things you can do can go a long way towards protecting your...
View Article6 Tips To Maintain Your Privacy While Searching For Jobs Online
Looking for employment today is dramatically different from how it was just two decades ago. It’s rare to just walk into a business, fill out an application, and get hired within the same day; today’s...
View ArticleTelltale Signs an App Is Violating Your Privacy
Malware isn’t just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your mobile phone or tablet than your computer. When it comes to mobile malware, a little bit of...
View ArticleCyber Security Top Tips for 2016
2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred.We took a look at...
View ArticleCredit Monitoring Services and Other Anti-Fraud Protection
Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims...
View ArticleiOS Device Users Should Update to 9.2.1 Now!
iOS device users- update your software now! Apple released an update to iOS 9 this week, which fixes a three-year old cookie theft bug. Cookies are small files that contain various types of data that...
View ArticleTechnology Usage and the Physical Effects on Your Body
Sure, there are plenty of amazing positives to technology but, as with most things, a fair share of negatives exists as well. One of the negatives technology presents is the physical effect on the...
View ArticleThousands of Websites Have Been Compromised With Malicious Code
Symantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website. Of the compromised websites, 75 percent...
View ArticleThe 5 Stages of Phone Loss Grief
It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your...
View ArticleYour Identity Is Connected to All of Your Devices. Here's How to Protect It.
You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available...
View ArticlePC or Mac: Which Is More Resistant to Cyber Threats?
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who don’t care if you prefer PC to Mac or vice versa. There has...
View ArticleVariant of Android Ransomware Uses Shady Tactics to Trick Users Into Giving...
Symantec has found a variant of Android ransomware that uses clickjacking tactics to try and trick users into giving the malware device administrator rights.. As well as encrypting files found on the...
View ArticleData Privacy Day 2016: Ten Ways to Keep Your Data Private
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and...
View Article7 Dos and Don’ts of Secure Online Tax Filing
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law...
View ArticleWhat Is a DDoS Attack? - #30SecTech by Norton
[norton-video:youtube-id:AY5MizD_Mv4]A distributed denial-of-service (DDos) attack is one of the most powerful weapons on the Internet. When you hear about a website being “brought down by hackers” it...
View Article8 Cyber Security Tips for Business Travelers
Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because...
View ArticleBiometrics How Do They Work? Are They Safe?
Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. Fingerprinting is a very early and simple version of biometrics, like when you...
View ArticleWhat Personal Information Should You Safeguard?
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to...
View ArticleThree Easy Steps to Protect Your Android
You could call mobile devices the new frontier for malware. Malware often appears on mobile devices in the form of an app. These apps sometimes include malicious code that makes the app do things it’s...
View Article