Quantcast
Channel: Norton - 博客 - Norton Protection Blog
Browsing all 199 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Is Personal Data Really Gone When It’s Deleted from a Device?

Most of us are familiar with deleting data—we do it almost every day. We move folders into the recycling bin, dump old emails into the trash, and delete personal records to free up space on a...

View Article


Image may be NSFW.
Clik here to view.

National Clean Out Your Computer day-The Importance of Clean Computing

February 8th is National Clean out Your Computer day, and as they say, “Cleanliness is next to Godliness.”  For centuries, this saying applied to tasks like scrubbing the floors and dusting the...

View Article


Image may be NSFW.
Clik here to view.

Norton App Lock: Protect Your Sensitive Apps

There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared device,...

View Article

Image may be NSFW.
Clik here to view.

Software Terms of Service and Privacy Policies Explained

If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as...

View Article

Image may be NSFW.
Clik here to view.

Super Patch Tuesday- Microsoft and Adobe Release a Slew of Patches for...

Patch Tuesday is an unofficial term used in the technology industry, which is when software companies regularly release security patches for their products. This week, both Adobe and Microsoft released...

View Article


Image may be NSFW.
Clik here to view.

Netflix Log In Credentials Being Sold on the Black Market

Attackers are setting their sights on stealing users’ Netflix credentials in order to sell them on the black market, providing access to the streaming service for less expensive prices.Netflix’s...

View Article

Image may be NSFW.
Clik here to view.

The 2016 Online Dating Guide

While Valentine’s Day is for lovers, we bet you didn’t know that there is a holiday for the single folks as well! Singles Awareness Day was created as an alternative to Valentine’s Day, and whether...

View Article

Image may be NSFW.
Clik here to view.

This Valentine's Day, Beware of Fake Apps as Cybercriminals Look to Cash in...

Every February, users both single and coupled tend to increase their downloads of Valentine’s Day-centric apps. These apps can come in the forms of Valentine's Day-themed wallpapers, horoscope...

View Article


Image may be NSFW.
Clik here to view.

How to Remove GPS and Other Metadata Locations From Photos

Once upon a time, a photograph provided only the information one could see in the physical print—no hidden data about locations, time and date, or the device that took the photo. With the advent of...

View Article


Image may be NSFW.
Clik here to view.

What is a Botnet?

[norton-video:youtube-id:PIlfVEs41NA]The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an...

View Article

Image may be NSFW.
Clik here to view.

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing...

View Article

Image may be NSFW.
Clik here to view.

Ransomware – What Can You Do About It

Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of...

View Article

Image may be NSFW.
Clik here to view.

New Ransomware Variant Locky Spreading Like Wildfire Since the Day It First...

A new variant of ransomware has been discovered on Tuesday (February 16), known as "Locky," and has been spreading swiflty since it first appeared. The attackers behind Locky have spread the malware...

View Article


Image may be NSFW.
Clik here to view.

Mazar BOT Malware Invades and Erases Android Devices

Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file. The Mazar BOT, as it is called, tricks the...

View Article

Image may be NSFW.
Clik here to view.

What To Do When You Fall For An Email Scam

Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves...

View Article


Image may be NSFW.
Clik here to view.

Latest Cyberthreat Intelligence for January

Symantec’s Global Intelligence Network (GIN) team has updated their intelligence page, which provides the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware,...

View Article

Image may be NSFW.
Clik here to view.

Internet Scams Based on Current Events Plague Users

It’s sad to say, but cybercriminals have learned how to use our emotions against us. When we read media reports about accidents or watch videos of natural disasters on the news, it’s normal to feel...

View Article


Image may be NSFW.
Clik here to view.

Protecting Android Devices and Why They’re so Vulnerable

The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at...

View Article

Image may be NSFW.
Clik here to view.

The Risks of Third Party App Stores

Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore...

View Article

Image may be NSFW.
Clik here to view.

What to Do When a Device Is Lost or Stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging as it may be, you must remain calm so you can take the necessary steps to retrieve...

View Article
Browsing all 199 articles
Browse latest View live