Norton UK Blog
Nobody likes the thought of their digital life being held hostage for a large ransom...
Avoid the dangers of free Wi-Fi by taking some easy steps to keep you secure.
When you think of a disaster, you probably imagine tornadoes, tsunamis, and earthquakes—environmental events that can devastate a community or continent. Digital disasters are a bit harder to imagine, and that’s because they’re not apparent among the tangible analog affected by similar disasters.
Digital disasters are characterized by less visible qualities, all of which disturb, damage, or delete the digitalized data, records, and information stored by an individual, company, or organization
With the festive season now behind us, it’s time to enjoy that internet connected gadget you may have treated yourself to or received as a gift. As exciting as these new devices are, it’s easy to get caught up in the fun of using it without considering how you will be using it in a few months. Now is the right time to make yourself aware of the ways that you’ll need to protect your new device and the information you store on it. Just remember—if it connects to the Internet, it is vulnerable.
From laptops to smart watches, to connecting safely online, here’s our ultimate guide on how to setup and protect your new tech.
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. So how do you create a smart home while following cyber safety best practices to keep it secure?
Falling for an email scam is something that unfortunately can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
When you hear about spies you might think of the super slick James Bond and one of his many catchphrases. We’re usually pretty relaxed about installing apps on our phones but did you know that your phone could be hijacked and taken over by a spy?
Shaken not stirred, right?
Social media usually only appears in the news when it’s at its worst: when predators are poaching potential prey online; when people are threatened by violence; or when hate groups find a place to coordinate.
There was a time when Spam was just processed meat in can. Like it or love it was something you put on your dinner plate. Today, however, it’s come to mean something totally different—and its meaning seems to be changing all the time, as spam tactics and cyber threats get more sophisticated.
If your planning on treating yourself to a new piece of tech or expecting a little surprise present this season remember not only should you protect your new toy but also prepare your old one for its new home. There are many ways to dispose of old tech, whether it’s donating your old phone to charity or handing down a retired laptop so once you’re ready to shift your digital life to a new device , you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled.
Christmas is a time for re-connecting with friends and loved one’s. Why not make your online moments even more secure this year with our gift to you – Our 12 days of Norton security tips...
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.
Second only to Facebook, Instagram is one of the most popular social media sites on the internet. It’s particularly popular with young people who flood the site with photos of themselves, their friends, and their lunches.
When you invest in a new PC, mobile or tablet it can be a pretty exciting time. From engaging in online experiences to getting lost in toying with its advanced technical capabilities, a new device opens up a world of possibilities to be ever more connected online. But, with these new experiences, come new challenges to protect your identity and personal data. We’ve put together a handy guide to new device safety to help you get the most from your new tech.
Every day more of the country gets better, faster wi-fi coverage. But that doesn’t stop your signal at home dropping off or grinding to a halt every now and then. Here are the latest tips from our top experts on how to get the most from your home service.
With 1.5 billion users on Facebook, 1000 million on WhatsApp, 400 million on Instagram and 320 million on Twitter…and growing, it’s fair to say that social networking has been globally embraced. As social media becomes chocked with our daily lives and personal information, it’s important to think about social safety for you and those you care for.
We’re all wishing it was still too soon to be talking about back to school, but the reality is the new school year is creeping closer day by day. Our experts have put together these tech tips to help you start the new term ahead of the curve.
It’s almost that time of the year again. You’ve worked hard and now it’s time to relax and enjoy a well-earned holiday. But, before you get to lay by the pool there’s a couple of things to think about so as your information stays safe, no matter if you’re travelling home or abroad.
There’s nothing quite like the feeling of grabbing a great bargain online but have you ever stopped to think whether that ridiculously unbelievable knock-down price is really saving you money in the long run?
Whether you’re in the market for a new laptop because you dropped yours on the floor or you fancy an upgrade of your specs for college or work, buying a new computer comes with a whole heap of jargon and plenty of sales speak. Do you really need a dedicated graphics card? And what do all those letters and numbers even mean?
Phones. We’re constantly attached to them, often more so than our laptops or work computers.
Everywhere we go, we carry tiny computers in our pockets. We can answer any question within seconds using Google or we can live stream movies or hours of footage of the Kardashians from pretty much anywhere. There’s even Wi-Fi on Mount Everest.
Technology is everywhere and it’s easy to feel overwhelmed. iPads are standard practice for kids, and books—like analogue clocks—are a thing of the past. Many of our kids know how to navigate the web before they’ve figured out how to make their beds.
Sharing is caring, or so the saying goes. As couples we must care a lot, because we’re sharing everything from passwords (big no-no!) and email accounts to financial data and social media profiles. But unfortunately, this tendency to share our digital space can make for a messy separation and divorce if relationships go belly-up.
And they do – according to the Office for National Statistics (ONS), 42 per cent of marriages end in divorce. And that figure doesn’t take into account cohabiting couples and those in civil partnerships who go their separate ways.
My beloved iPhone5 used to be chockfull of digital detritus: apps I’d used once or twice, gazillions of family photos that I’d already copied over to my laptop and to Google drive, fuzzy videos, unopened emails, unplayed games and a virtual library of forgotten files saved to my home screen. They were all gobbling up memory, draining the battery and putting the brakes on my phone’s performance.
Familiar tale? If so, don’t despair – it’s easy to fix.
Whether you have an Android, iOS or Windows device, don’t delay – do yourself and your phone a favour and start uncluttering right now. In a few simple steps, you’ll have a better and faster phone.
Webcams are great fun. They allow us to talk face to face and in real time with family and friends who live a long way away, hold work meetings with colleagues around the globe, and make videos to post online. Plus you can see each other’s facial expressions and other non-verbal body language cues, making for a much better communication experience than a text chat or ordinary phone call. They’re also widely accessible, as they’re cheap, small and simple to use and are usually pre-installed on laptops.
What’s risky about webcams?
Webcams may feel private – but they’re not. If the person you’re talking to via webcam records you, they can share the video (or any stills they take) with other people, post the content online, share it on Facebook, or email it to someone.
Most kids love playing online games. No surprise there – they’re fun, entertaining, encourage creativity and are often educational. They’re great to play with existing friends, and offer the opportunity to make new ones too. Online games allow kids to chat to and play with or against an enormous number of other players anywhere in the world, across all borders of time, language, geography, age and culture.
Unfortunately, gaming is also enormously appealing to hackers and others of ill repute, and holds privacy and security risks that need to be faced. It’s therefore important for you and your children to identify and understand these risks, and learn how to handle them. Following the practical tips below will help you and your kids to have some age-appropriate and safe fun while gaming online.
Is your computer behaving oddly? Have your settings changed? Perhaps you’re being pestered by pop-up ads, even when you’re not surfing the web? Or maybe your computer is running slowly, freezing more than usual, or programs are frequently crashing? Sounds like you may have picked up spyware or other unwanted software.
Spyware isn’t just a potential nuisance – it can also pose serious security and privacy risks. Malicious spyware aims to track your online movements and harvest and exploit your private information, such as credit card details and account user names and passwords. It may also change your home and search page settings, install unwanted add-ons, redirect you to offensive sites and even make changes to your computer’s registry.
I’ve got a bit of a reputation. Whether you know it or not, you probably have too.
I’m talking, of course, about our online reputation – the image we create of ourselves on the internet. Everything we post – blogs, tweets, photos and videos, likes, links, comments and shares – contributes to our online reputation. So, too, does whatever other people post about us. And anyone who discovers this information will form judgements about you and me, based on what they see – and may even use it against us.
Bullying – it’s an age-old problem. But it’s one that’s found a new lease of life on the Internet. Thanks to our ‘always on’ mobile technology and our enthusiasm for sharing everything without care, cyberbullying has found the perfect home online. Cyberbullies can hide behind the anonymity of the Internet, and reach their target easily at almost any time and from anywhere, while broadcasting to a potentially limitless audience.
- blog (4)
- digital trends (34)
- family security (28)
- gaming and entertainment (10)
- how to guides (29)
- internet of things (9)
- mac tips (2)
- mobile insights (13)
- mobile safety (26)
- online safety (63)
- online safety tips (34)
- online security (72)
- online security tips (35)
- online threats (50)
- optimise your device (14)
- parental control software (7)
- social media (14)
** Dark Web Monitoring defaults to monitoring your email address and begins immediately. Please sign in to your account to enter additional information for monitoring purposes.
No one can prevent all cybercrime or identity theft.
The Norton and LifeLock brands are part of NortonLifeLock Inc. LifeLock identity theft protection is not available in all countries.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.