Is Personal Data Really Gone When It’s Deleted from a Device?
Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a...
View ArticleNational Clean Out Your Computer day-The Importance of Clean Computing
February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.” For centuries, this saying applied to tasks like scrubbing the floors and dusting the...
View ArticleNorton App Lock: Protect Your Sensitive Apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared device,...
View ArticleSoftware Terms of Service and Privacy Policies Explained
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as...
View ArticleSuper Patch Tuesday- Microsoft and Adobe Release a Slew of Patches for...
Patch Tuesday is an unofficial term used in the technology industry, which is when software companies regularly release security patches for their products. This week, both Adobe and Microsoft released...
View ArticleNetflix Log In Credentials Being Sold on the Black Market
Attackers are setting their sights on stealing users’ Netflix credentials in order to sell them on the black market, providing access to the streaming service for less expensive prices.Netflix’s...
View ArticleThe 2016 Online Dating Guide
While Valentine’s Day is for lovers, we bet you didn’t know that there is a holiday for the single folks as well! Singles Awareness Day was created as an alternative to Valentine’s Day, and whether...
View ArticleThis Valentine's Day, Beware of Fake Apps as Cybercriminals Look to Cash in...
Every February, users both single and coupled tend to increase their downloads of Valentine’s Day-centric apps. These apps can come in the forms of Valentine's Day-themed wallpapers, horoscope...
View ArticleHow to Remove GPS and Other Metadata Locations From Photos
Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo. With the advent of...
View ArticleWhat is a Botnet?
[norton-video:youtube-id:PIlfVEs41NA]The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an...
View ArticleParticipating in Legitimate Surveys- What Personal Data is OK to Give Away
Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing...
View ArticleRansomware – What Can You Do About It
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of...
View ArticleNew Ransomware Variant Locky Spreading Like Wildfire Since the Day It First...
A new variant of ransomware has been discovered on Tuesday (February 16), known as "Locky," and has been spreading swiflty since it first appeared. The attackers behind Locky have spread the malware...
View ArticleMazar BOT Malware Invades and Erases Android Devices
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file. The Mazar BOT, as it is called, tricks the...
View ArticleWhat To Do When You Fall For An Email Scam
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves...
View ArticleLatest Cyberthreat Intelligence for January
Symantec’s Global Intelligence Network (GIN) team has updated their intelligence page, which provides the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware,...
View ArticleInternet Scams Based on Current Events Plague Users
It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel...
View ArticleProtecting Android Devices and Why They’re so Vulnerable
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at...
View ArticleThe Risks of Third Party App Stores
Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore...
View ArticleWhat to Do When a Device Is Lost or Stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve...
View Article