Quantcast
Channel: Norton - 博客 - Norton Protection Blog
Browsing all 199 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

5 Red Flags of Identity Theft

An estimated 11.7 million people are victims of identity theft each year. It is a growing crime and it is expected to grow more with each passing year.There is a big demand for stolen identities in the...

View Article


Image may be NSFW.
Clik here to view.

DefCon 24- Hacking to Make the World a Better Place

Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I...

View Article


Image may be NSFW.
Clik here to view.

How To Talk to Your Kids About Cyberbullying

Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...

View Article

Image may be NSFW.
Clik here to view.

Pop-Cultural Relevance of Hacking in Today's World

When hacking was first introduced in film and television, it was nowhere near as prevalent as it is today. The threat landscape was years away from becoming what it is now, so hacking and cybercrime...

View Article

Image may be NSFW.
Clik here to view.

What Is VoIP?

VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional...

View Article


Internet Acronyms and Slang Your Teen is Using, and What it all Means

Seem like Greek to you? Well, you’re not alone. Kids these days have evolved into creating their own language to communicate with each other. Between undecipherable anagrams, to strange slang terms,...

View Article

Image may be NSFW.
Clik here to view.

Keep Your Home Wi-Fi Safe in 7 Simple Steps

It is beginning to feel like the Internet is a basic necessity for existence in the 21st century. With all our devices connected to the Internet, we have an indescribable physical mobility that leads...

View Article

Image may be NSFW.
Clik here to view.

Can a mobile phone battery track you?

With this little known exploit, a mobile phone’s battery life can actually be used to track online behavior. Security researchers have found that the battery status API of mobile devices can be used to...

View Article


Image may be NSFW.
Clik here to view.

The Most Common Threats Children Face Online

Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, it’s important to know...

View Article


Image may be NSFW.
Clik here to view.

轻松享受数字生活:有效保护家人在线安全的 10 大互联网安全规则

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...

View Article

Image may be NSFW.
Clik here to view.

How a VPN Can Help Hide Your Search History

Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search...

View Article

Image may be NSFW.
Clik here to view.

Can the Elections Get Hacked?

The security of electronic voting machines has been the subject of scrutiny, just before the November U.S. presidential elections. Are they secure? Are they anonymous? And if the answer is yes, how can...

View Article

An Indepth Look At Cyberbullying and How it's Done

The advancements in technology have made Internet communications a natural way of life. Especially to children, since this is a technology they were born into instead of adopting it, like adults have...

View Article


Image may be NSFW.
Clik here to view.

The Basic Steps to Online Safety and Security- NCSAM Week 1

Since our physical world has become so integrated with our technology, it’s not as easy as to protect it back when all we had to worry about was our computers and laptops. However, in this day and age,...

View Article

Image may be NSFW.
Clik here to view.

Exploring the Deep Web

There are multiple “layers” to the Internet that you may not be aware of. The first, or top layer is called the surface web, and it is the part of the web that is crawled by search engines. That’s the...

View Article


Online Harassment: Halting a Disturbing 'New Normal'

A new survey uncovers the prevalence of harassment against men in the online world and suggests ways to combat it.On the face of it, Gold Coast Titans National Rugby League (NRL) player Jarryd Hayne...

View Article

Image may be NSFW.
Clik here to view.

From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in...

Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies, nonprofits…...

View Article


Image may be NSFW.
Clik here to view.

Safe Online Shopping Tips for the Holiday Season

The shopping season is coming and if you’re a modern consumer you’re going to be doing at least some of your holiday shopping online. The problem is that some of the most dangerous places on the web...

View Article

Image may be NSFW.
Clik here to view.

How To Recognize and Protect Yourself from Cybercrime

Cybercrime is a growing threat in 2016. You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. Unfortunately there are far more...

View Article

Image may be NSFW.
Clik here to view.

The Smarter Home: How to Create a Smart Home

Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected...

View Article
Browsing all 199 articles
Browse latest View live