Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, Symantec Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

Read More

The risks of public Wi-Fi

Did you know there could be threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte at your favorite cafe?

Read More

Data breaches aren’t going anywhere--what you need to know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.

Read More

10 Internet safety rules to help keep your family safe online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...

Read More
Featured Articles
  • How to protect against phishing scams

    Phishing is an online con game, and phishers are nothing more than tech-savvy con artists. In a typical phishing scam, phishers send out emails, which appear to come from a legitimate company, in an attempt to scam users into providing private information that will be used for identity theft.

    Read More
  • The smarter home: How to create a smart home

    One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.

    Read More
  • What to do when a device is lost or stolen

    Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...

    Read More
  • Catch spyware before it snags you

    Have you ever clicked on an intriguing ad or link while surfing the Web and had a barrage of pop-up windows flood your screen or your browser suddenly send you to a slew of unsavory sites?

    Read More
  • The most common threats children face online

    Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, its important to know...

    Read More
  • What are cookies?

    Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.

    Read More
  • What is a VPN? And why you should use a VPN on public Wi-Fi

    Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk.

    Read More
  • What to do if you become involved in a data breach

    Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank account numbers, Social Security numbers, birthdates, full names and addresses. They can commit identity theft with Social Security numbers, sell credit and debit card numbers to other cybercriminals or bleed bank accounts dry using bank account information.

    Read More
Featured Categories
  • Malware

    The best protection from malware starts with your online habits. Read articles about emerging malware threats and how to protect yourself.

    Read More
  • Privacy

    Equip yourself with best practices to take control of what you share online. Read articles about how to keep your online activity and identity private.

    Read More
  • Online Scams

    In this section learn about scams that cybercriminals use to steal information and commit identity theft. Read articles on how to spot and prevent online scams.

    Read More
  • Kids' Safety

    With the right information at your fingertips, you can make better decisions for your child’s cyber safety. Read articles about online security for your family.

    Read More
  • IoT

    Learn about emerging threats to your Internet connected devices, and ways you can keep your home network secure.

    Read More
  • How To

    Educating yourself about vulnerabilities on the Internet is your first line of defense. Read articles about how to spot spam, avoid ransomware, and more.

    Read More