Don’t Let Social Network Sharing Ruin Your Celebrations
Celebrating life’s milestone events is something we cherish. Births, weddings, and anniversaries. Even a death, although sad, can be a reason to celebrate the life of a loved one. And in most cases, as...
View ArticleWhy Hackers Love Public WiFi
A free Wi-Fi connection in a public space can seem like a lifesaver when you’re on the go. But if you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for...
View ArticleIs Your Identity Exposed? Tips to Secure Your Identity Online
Did you know that 429 million identities were exposed in 2015? Findings from the 2016 Symantec Internet Security Threat Report show that this number actually hides a bigger story. While there was a...
View ArticleHow to Avoid Public Wi-Fi Woes on a Business Trip
Now that summer is here, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country...
View ArticleThe Day I Thought Cybercriminals Left Me For Dead
Early on a Wednesday evening, I received a call from my doctor. Her voice, frantic on the line, proclaims, “I’m so happy to hear your voice- the strangest thing happened today. You were marked in our...
View ArticleHow to Stay Safe When File Sharing Online
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications...
View Article#30SecTech: What Is a VPN?
There’s a good reason hackers love free public Wi-Fi. It’s because they can easily access information on unsecured Wi-Fi networks. So when you’re in a coffee shop or an airport checking your emails or...
View ArticlePaying Friends Through a Mobile Payment App
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but...
View ArticleHow Safe Is Surfing on 4G vs. Wi-Fi?
You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the...
View ArticleWhat Can Someone Do With a Stolen Identity?
Identity theft is the worst kind of theft there is. You don’t just lose your finances, you lose yourself. There is someone out there taking over your life one step at a time and ruining it for you....
View ArticleWatch "Zero Days," a Thrilling Look at the Cyber Warfare Stuxnet Virus That...
Introducing “Zero Days,” the real-life cyber warfare documentary featuring Symantec cyber-security experts Eric Chien and Liam O’Murchu. You may have heard about the Stuxnet virus in the media over the...
View ArticleHow Facial Recognition Software Works
If you’ve uploaded pictures to Facebook recently, you might have noticed that it has the uncanny ability to recognize people's faces. This is just one example of high-tech facial recognition software...
View ArticlePokémon Go Cyber Security and Privacy Guidelines
In one way or another, you’ve probably heard of Pokémon Go, the latest new app that seems to be taking over smartphones everywhere. When I first heard about the app, it piqued my curiosity, given my...
View ArticlePokémon Go Parents Guide for Children
One of the great things about this game is that is popular amongst both children and adults, so our main suggestion is to play with them. This can be a great opportunity for you to engage and play...
View ArticlePokémon Go Real World Risks and Safety Tips
The goal of this game is quite the opposite of all other games- to get you out into the world and interacting with other people playing the game. If anything, parents have been applauding this game...
View ArticleWhat Is a No-Log VPN Network?
Virtual private networks, or VPNs, allow people to use public Wi-Fi hotspots safely by encoding, or encrypting, the data sent or received during the user’s online session. This shields users’ privacy...
View ArticleHow to Securely Set Up Your Home Wi-Fi Router
Wireless Internet access is one of the modern conveniences of our time. However, your home wireless router can also be an access point for hackers. If your Wi-Fi router isn’t secured properly, you...
View ArticleProtecting Your Child From Identity Theft
Identity theft is a growing menace. With each passing day, cyber criminals are getting greedier and more malicious. They don’t spare anyone when it comes to reaping unethical financial gains.They wont...
View ArticleNorton @ DefCon
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the Internet security sector to...
View ArticleWhat Is Smishing?
A form of phishing, smishing is when someone tries to trick you into giving them your private information via a text or SMS message. Smishing is becoming an emerging and growing threat in the world of...
View Article