Symantec Celebrates Safer Internet Day by Uniting for a Better Internet.
Sad. Freak. Crybaby. Loser.
These words all sound pretty harsh, right? They do not feel very good to read here, but imagine them directed at you personally. In the world of child and teen online activity, these types of words can become all too familiar to the millions of children cyberbullied each year around the world.
Having a productive and safe online digital life is important. You need a full-service Internet security suite to protect you from emerging threats online. If you’ve been looking around for products, you’ve probably noticed there are lots of options out there that are completely free and there are some that require a purchase. Taking the free option might seem like the most attractive option, but it’s not. In fact, free Internet security software isn’t all that it’s cracked up to be. Here’s why:
Keeping safe online is a big deal. While we all want to take it seriously, sometimes the vocabulary can be very complicated—especially if you’re not the most tech savvy. What exactly do all those phrases mean?
When you think of a disaster, you probably imagine tornadoes, tsunamis, and earthquakes—environmental events that can devastate a community or continent. Digital disasters are a bit harder to imagine, and that’s because they’re not apparent among the tangible analog affected by similar disasters.
Digital disasters are characterized by less visible qualities, all of which disturb, damage, or delete the digitalized data, records, and information stored by an individual, company, or organization
Children are among the most active Internet users, and are unfortunately exposed to a number of threats lurking online. If you allow your children to spend considerable time surfing the web, it’s important to know what they face so you may deal with them accordingly. But what are some of the most common online threats to children that you should know about?
With the festive season now behind us, it’s time to enjoy that internet connected gadget you may have treated yourself to or received as a gift. As exciting as these new devices are, it’s easy to get caught up in the fun of using it without considering how you will be using it in a few months. Now is the right time to make yourself aware of the ways that you’ll need to protect your new device and the information you store on it. Just remember—if it connects to the Internet, it is vulnerable.
From laptops to smart watches, to connecting safely online, here’s our ultimate guide on how to setup and protect your new tech.
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. So how do you create a smart home while following cyber safety best practices to keep it secure?
Malware is created by hackers and is often distributed over the internet. While many people are considerate of malware as a threat to their desktop computer or laptop, they tend to be more lax when it comes to their tablets and smartphones – which means mobile devices are ripe for the picking when it comes to identity theft, stolen personal information, emptied bank accounts, and viruses meant to break the device in question.
What types of mobile malware exist?
Safer Internet Day is fast approaching and on February 7th online users are being encouraged to unite to make the online world a safer place with this year’s theme being “Be the change, unite for a better internet”.
Have you considered how you can keep your family's personal information safe in the digital world?
Falling for an email scam is something that unfortunately can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Picture the scenario: your poor nan has already been scammed once before. She received an email from a long-lost aunt in Honolulu who offered her the chance of an emotional reunion. She clicked the link or wrote back and began a chain of communication that resulted in the loss of a small fortune.
There’s a new kind of crime in town and it’s starting to make itself known. You may have heard about it in the news, read about it online or worse still, you could have already been a victim. Its name is Ransomware and you certainly don’t want to be inviting it around to your house for high tea.
When you hear about spies you might think of the super slick James Bond and one of his many catchphrases. We’re usually pretty relaxed about installing apps on our phones but did you know that your phone could be hijacked and taken over by a spy?
Shaken not stirred, right?
Social media usually only appears in the news when it’s at its worst: when predators are poaching potential prey online; when people are threatened by violence; or when hate groups find a place to coordinate.
There was a time when Spam was just processed meat in can. Like it or love it was something you put on your dinner plate. Today, however, it’s come to mean something totally different—and its meaning seems to be changing all the time, as spam tactics and cyber threats get more sophisticated.
The notion of someone taking over your computer and watching you through your webcam may sound like something from James Bond but hackers are already using this technology. Spyware is a serious threat and victims are often unaware that they’re being spied on.
If your planning on treating yourself to a new piece of tech or expecting a little surprise present this season remember not only should you protect your new toy but also prepare your old one for its new home. There are many ways to dispose of old tech, whether it’s donating your old phone to charity or handing down a retired laptop so once you’re ready to shift your digital life to a new device , you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled.
Our world is hyper-connected, with social media, smart tech, wearables, and apps meaning we’re constantly online. But it’s only going to get more advanced as we move further towards to the Internet of Things.
Free Wi-Fi hotspots are a great convenience that allow us connect to information and people while on the move. Whether it's at the local coffee shop, restaurant or travelling further afield free public Wi-Fi is no longer just something we do to when on holidays.
We use it every day, in ever growing places for pleasure and sometimes when travelling for business but while it makes our lives easier to connect to public networks, it also presents a risk to the personal information on your smartphone, tablet or laptop.
It’s that time of the year when we catch up with family and friends to celebrate the festive season. It’s a busy time for most and probably more than once you’ll find yourself connecting to free Wi-Fi whether it’s in a café, restaurant or shopping mall. But did you know most public Wi-Fi networks are unsecure and could pose a threat to the security risk to your sensitive data or identity?
As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports on their journey home — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Christmas with the family, here’s a handy checklist to keep smartphones, tablets, and laptops safe while spending time in an airport.
Christmas is a time for re-connecting with friends and loved one’s. Why not make your online moments even more secure this year with our gift to you – Our 12 days of Norton security tips...
Your digital world can be a busy place but have you thought of how you’re connecting every day to your online life?
Most internet users have encountered spyware at some stage but few people actually know much about it...
Spear phishing may sound like something Bear Grylls does at the weekends but it’s actually a pretty sneaky form of cyber-attack. Most people will be familiar with phishing – and spear phishing is like its smarter little brother...
The festive season is a time of merriment for one and all. That includes scammers, fraudsters, and thieves too who use this time of the year to do their worst.
You don’t have to be a super nerd to know how to protect yourself from cyber criminals and hackers. They might know more about computers and software than you do however, there are some basic defenses at your disposal to help you stand up against even the most sophisticated online threats.
Online socialising has revolutionized how we communicate but it has its pro’s and con’s. While it has opened a whole new dimension and convenience to our lifestyles, it unfortunately has some unpleasant effects too...
Having a mobile device has become one of life’s essentials and when a loss or theft occurs it can be a sickening feeling, and often one that can be pretty stressful.
While many of us safeguard our desktops and laptops from a cavalcade of online threats, we’re much more lax about our phones. We download apps without a second thought or log into our bank accounts on public networks where just about anyone could be watching in.
One night of the year ghosts and goblins are free to haunt us. Malware and viruses, however, are free to terrorize us all year long. Here’s our…Five most frightful viruses terrorizing computer users everywhere.
We love being connected in the digital world. Whether it’s our smartphone, tablet or Pc device it is hard to imagine a world without them. From online shopping, to gaming to sharing moments with our connections we use the online world in ways that have not gone unnoticed.
Did you know Smartphones and tablets are an increasingly attractive target for online criminals?
You’ve probably seen them lurking in your news feeds- breaking news reporting a celebrity’s death, photos of natural disasters striking major cities, video footage of riots and outrage over an accidental shooting- all seemingly legitimate news stories. However, this “news” may not be what it seems.
Did you know? 83% of people in the UK fear their information can be stolen when using public Wi-Fi…but only 16% do something to prevent it.*
Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk. That’s why a virtual private network, better known as a VPN, is a must for anyone worried about their online security and privacy. No matter if your connecting to free wifi hotspots for pleasure or while travelling for business keeping your information safe on public networks is important.
Phishing can sometimes be dismissed as a less serious type of cybercrime but it can have devastating effects on people’s lives. How much damage could a scammer seriously do with some login details or some random personal information, you ask? Well, a lot as it turns out.
While most of us travel the globe vacationing, business travelers work their way around the country and the world 365 days a year. According to the quarterly GBTA Sentiment Business Traveler Index, these working travelers face challenges in staying productive on the go — and mobile connectivity is a large factor in the success of a business trip. Although often overlooked, staying secure on public Wi-Fi should also be an important thought when on business travel.
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.
Second only to Facebook, Instagram is one of the most popular social media sites on the internet. It’s particularly popular with young people who flood the site with photos of themselves, their friends, and their lunches.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
When you invest in a new PC, mobile or tablet it can be a pretty exciting time. From engaging in online experiences to getting lost in toying with its advanced technical capabilities, a new device opens up a world of possibilities to be ever more connected online. But, with these new experiences, come new challenges to protect your identity and personal data. We’ve put together a handy guide to new device safety to help you get the most from your new tech.
It’s the time of year when schools return for classes and the summer holidays seem a distant memory away. It might be back to the usual routine but if you’re the type of person that likes to grab that last minute getaway travel deal we’re sharing five of our best life hacks with you to make sure you get the most from your tech while away from home.
One of the highlights of any holiday is getting away from it all to have a rest and relax. Unfortunately criminals are aware of when we let our guard down and tourists are a key target for them.
If today’s children are the first generation to be raised natively using instant messaging, they should remember that it was their parents who were the pioneers in crafting the art of texting and should be respected for their many great single line literary works and burns.
Every day more of the country gets better, faster wi-fi coverage. But that doesn’t stop your signal at home dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your home service.
With 1.5 billion users on Facebook, 1000 million on WhatsApp, 400 million on Instagram and 320 million on Twitter…and growing, it’s fair to say that social networking has been globally embraced. As social media becomes chocked with our daily lives and personal information, it’s important to think about social safety for you and those you care for.
For all intents and purposes your smartphone is a convenient amalgam of computer, diary, bank account and television. You eat with it, email with it, play with it, and on the odd occasion, even make phone calls with it. It’s your favourite recipe book, your cherished photo album, your financial vault, and you should be treating it with the utmost care and attention.
Social media can be a wonderful place to stay connected with family, friends and to view the world going by. But, did you know every year millions of people fall victim to social media scams?
Have you ever wondered if it’s safe to use public Wi-Fi? It’s a question we should all ask ourselves as we more and more utilize free Wi-Fi connections.
For many parents, attempting to keep their children safe online is a daily task. From smartphones to tablets, messaging apps to 24/7 audio visual experiences, growing up in today’s world is a lot different than how we might have experienced it. But, how can you protect your children from a threat landscape and a platform that has become ingrained in their upbringing?
A lot of money changes hands in the build up to the new school year. Because it’s a big time for businesses and every parent and student has an eye on bargains, it’s also a key time for scammers and criminals to try to find a way into your wallet. Here’s our advice to avoiding their latest tactics.
We’re all wishing it was still too soon to be talking about back to school, but the reality is the new school year is creeping closer day by day. Our experts have put together these tech tips to help you start the new term ahead of the curve.
The new school year in the 90’s meant packing an oversized bag full of folders and textbooks, gadgets and other junk. It’s remarkable how much things have changed since then, here’s our recap of five trends that were a cornerstone of our school lives and how they’ve totally changed.
The internet is a wonderful resource that’s full of information, entertainment and funny cat pictures but it can also be a dark place if you stray off the path or run into digital criminals. Unfortunately, anywhere that attracts lots of people will inevitably attract criminals who see these users as potential victims.
We all use search engines on a daily basis. It’s become routine in many of our lives. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds.
Cyberbullying is a subject that’s captured plenty of headlines though it’s just a modern version of an old problem. Sadly, bullying has been part of the human existence for longer than anyone can remember. So it’s hardly a surprise that this behaviour has taken on a new lease of life on different social media platforms.
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?
Instagram accounts are being hacked and used to lure other users to adult “dating” websites, while earning money for the scammers. Read how to protect yourself.
Are you a gadget freak? A bit of a tech head? If you’re the sort of person who just can’t help feeding your nerdiness even while on holidays, here’s our lowdown on some of the best getaway spots for tech-heads.
Unless you've been on holiday in Timbuktu, you'll have heard about this new phenomenon sweeping the globe. For gamers and smartphone lovers this new game has presented some exciting interactive play but how can you keep your young players safe both online and off?
Parenting is a fast paced life. One minute it’s caring for the family nest to juggling the dawn scramble for p.e. kit , packing lunchboxes and dealing with tantrums at all hours of the day. We take on a multitude of professions offline over the course of our children’s lives - Taxi driver, chef even IT specialist, that some might think a parent has superhuman powers.
It’s almost that time of the year again. You’ve worked hard and now it’s time to relax and enjoy a well-earned holiday. But, before you get to lay by the pool there’s a couple of things to think about so as your information stays safe, no matter if you’re travelling home or abroad.
There’s nothing quite like the feeling of grabbing a great bargain online but have you ever stopped to think whether that ridiculously unbelievable knock-down price is really saving you money in the long run?
After working hard all year, taking a holiday is one of those moments you get to relax. We pack our lives into a suitcase, looking forward to that worry free time.
And more often than not we’re accompanied by at least one of our devices on our travels. Understanding how best to protect your devices from all kinds of threats is pretty important but did you know there are some extra precautions you can take when you’re travelling with a smartphone, tablet or laptop?
Two English strikers. Two top scorers in this season’s Premier League. A mobile back four and a proven goalkeeper. A twenty year old whiz kid at the base of midfield and a record breaking goal scorer at the helm, there have been rumblings, that this could be England’s year.
And with Euro 2016 fast approaching, many residents are scrambling for tickets to see their team do battle in France.
Phishing is when someone tries to get you to give them your private login information. That could be in the form of an instant message that asks, a phony online form made to look legitimate or, increasingly, a text or SMS message.
In the latter form this is known as “smishing.” Smishing is an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
An inkling of sunshine on any given afternoon and the UK population takes to the streets, doesn’t really matter whether it’s cold or not, anything more than an hour of sustained sun and the barbecues are blazing like the beacons of Gondor. Here’s five apps that should help in your struggle to organise that most fabled of events… a successful picnic.
In today’s world, parents have to worry about much more than protecting their children from harm in public settings.
Of the 7.4 Billion people that inhabit this planet, data compiled by Statista indicates that close to 2 Billion of us indulge in video games; there are now more gamers than the collective population of China and the U.S.
Gambling is not a new phenomenon, in fact archaeological evidence indicates that it existed in rudimentary forms as far back as 40,000 BC when our ancestors threw dice made of bone; around 30,000 years later the Chinese developed a wagering game involving tiles, then came the Persian game of As-Nas in the 17th century, the advent of saloons in 19th century America, and the introduction of the modern casino as we know it, of which there are now some 3500 in existence.
With the recent news that some of the UK’s major banking companies will be offering their customers the chance to use fingerprint or voice authentication to access their bank accounts biometrics are very much in the spotlight. So, what exactly are biometrics and how could they possibly be as secure as they seem?
You’ve heard of carjacking, and may recall Nicolas Cage’s performance in Con Air—an action-packed thriller about dangerous prisoners hijacking a plane. Now it’s time to familiarize yourself with Clickjacking, an Internet scam that’s out to steal your clicks.
According to recent UK Online Dating Statistics, 1 in 5 relationships in Great Britain now start online and with a study published by a leading matchmaking website suggesting that by 2031 that figure could well be 1 in 2 it is apparent that most of the stigma surrounding online dating has dissipated.
Back in the dark old days before the internet, students were forced to risk paper cuts and strained eyes in order to research an assignment using actual books.
Writing an assignment in these times of digital enlightenment can still be a nuisance for the devoted (and not-so-devoted) student but the internet has made the process much easier than it used to be.
Whether you’re in the market for a new laptop because you dropped yours on the floor or you fancy an upgrade of your specs for college or work, buying a new computer comes with a whole heap of jargon and plenty of sales speak. Do you really need a dedicated graphics card? And what do all those letters and numbers even mean?
The tech and science world is a very interesting place. Between sending brave explorers to Mars, the constant evolution of robot tech, and Elon Musk’s supersonic train, our world is shaping up to take on the veneer of a sci-fi film.
Cybercrime may sound like something that only happens to big corporations or super-secret government agencies, but it happens all the time to regular people and their families.
Cybercriminals use the internet to attack you (or other people) for their financial gain. It can be difficult to guarantee that your family is protected but there are some simple things you can do to keep them as safe as possible.
There’s an old saying that the greatest trick the devil ever pulled was convincing the world that he didn’t exist. Most internet users have encountered Adware at some stage but few people actually know much about it. Like the devil in question, Adware doesn’t seem to exist either.
Except Adware is a very real threat.
This Spring, you can purchase Norton Security at a discounted rate for a limited time only. Until end of March you can get 40% OFF Norton Security Deluxe.
By Kevin Haley, Director, Security Response, Norton by Symantec
Today, Norton released findings from a survey of more than 5,000 consumers from the US, UK, Canada, Australia and Japan about their fears of and forays into the connected world. The survey makes it clear that there are two types of people: those who understand smartphones and IoT devices come with risks, and those who do not.
Smartphones are growing increasingly smart and Siri is the perfect example of that. A voice command app, Siri is renowned for her sassy comebacks and funny comments—as well as for making life easier for people who are too lazy or busy to type. With a couple of phrases, you can transform Siri into a personal assistant extraordinaire, but should you use her for everything?
Reading detailed reports about online security may sound like a useful cure for insomnia. Instead, you can abandon the reports and use podcasts to keep updated with online security and the threats that are out there.
It’s official! Norton Security has won ‘Best Protection’ for home users in the 2015 AV-TEST Awards for its “high security performance protection without exception in all the certification tests”*.
If you’ve never had a virus you might be tempted to write it all off as a load of people panicking over nothing. How much damage can a virus really cause? Do hackers really steal data and identities and wreck computers?
Emails scams are often more subtle than you’d expect; they generally won’t set off any flashing lights or alarm bells like when someone is trying to steal a car. But just like with other forms of break-ins or robberies, there are signs to watch out for.
Phones. We’re constantly attached to them, often more so than our laptops or work computers.
As far as malware goes, ransomware is probably the one people know the least about. We often hear loads about viruses and worms on the news and on TV, but ransomware doesn’t often get a shout-out.
Protecting your family from online threats and the dark side of the web may seem like a daunting task but you don’t need to pull your hair out just yet.
If you've babysat a young child recently, you've probably noticed a habit most of them have picked up.
Most of us have a beloved smartphone that we keep with us at all times, tucked away in our pockets or our handbags. But carrying a phone around with us all day doesn’t mean that we actually fully understand them.
If you read any of the many horror stories about online safety you’ll want to wrap your kids up in cotton wool and ban them from the internet until they’re 35.
Online security is a hot topic. There are few weeks that pass by where we don't hear about a new or emerging online security threat, virus, trojan or hacking event. But have you ever wondered about how your online behaviour may be leaving you open to these threats?
We hear a lot in the news these days about companies and prominent individuals and celebrities being hacked. However, did you know that anyone with an online presence can potentially have their accounts or online profiles hacked? Do you know what steps you should take if you have discovered you've been hacked?
How do you create a strong password? It is vitally important that you secure your online accounts with strong passwords that are difficult for any would be cyber-criminal to guess or 'crack'.
Here is a handy infographic with some 'golden rules' for creating a strong password! Feel free to download (right click, and then 'save image'), or click on the icons above to share on social media.
Christmas is the most wonderful time of the year, and a time when many receive new gadgets like laptops, smartphones, tablets and more.
Christmas and the holiday season is almost here, which means that many of us will be shopping online to avoid large crowds and the hustle and bustle on the streets and in the shops.
Introducing #30SecTech - a series of quick, bitesize educational videos on a range of topics including cybercrime, internet security, online privacy and more. Plus, we have a bonus! At the end of every video you will find a link to an article providing more background information on each topic. Enjoy!
All the way back in 2013, uSwitch.com did a survey where they discovered that nearly one in 10 kids get their first mobile phone by the time they turn the ripe old age of five. If that seems very young, you’ll be relieved to know that the average age for a first phone was a more reassuring 11.
With a purported two billion people set to be using smartphones by the end of 2016, smartphone security has never been more essential. As the smartphone market grows, the risk of attack becomes greater, as increasing amounts of personal and professional information are stored on these devices, which fraudsters aim to use for their own gain.
The only thing that changes faster than technology is fashion—so what happens when you combine both fast-paced industries? A lot of excitement, that’s what, even for those of us who are more at home in an old t-shirt.
Posted in digital trends