Today is the Safer Internet Day: tips for safe and responsible use of online technology
This 9th February marks Safer Internet Day! On this day, we are reminded of our role in creating a better internet environment for ourselves and our loved ones through safe, responsible and positive use of digital technology.
Android.Bankosy gets updated to steal passwords sent through voice calls generated by 2FA systems.
Symantec has seen several cases where the malware installed on the victim’s device snooped on or intercepted the incoming SMS containing the OTP.
Popularity of Apple devices prompts surge of new threats
Apple users can no longer be complacent about security, as the number of infections and new threats rises.
Symantec Predictions for 2016 — Looking Ahead
In 2015, we saw how much consumer confidence was rocked by the number of mega breaches that exposed the identities of millions of people. The ability for some organizations to recover from a data breach was paralyzing as we saw in the Ashley Maddison data breach.
Symantec Introduces New Era of Advanced Threat Protection
SymantecTMAdvanced Threat Protection helps companies uncover, prioritize and remediate advanced threats across their control points – fast
Internet Security Threat Report Vol. 19: Mega Breaches, Targeted Attacks, and Planned Cybercrime
According to this report, cyber criminals are cutting down on small heists. They're aiming big.
Security Response: Meet Cyclosa, the Gang Behind 2013’s Biggest Data Thefts
Here's a gang you don't want to meet.
How to Protect Yourself on Social Media Networks – A Few Simple Tips
Social media helps. It also has its hazards.
The End of Windows XP is Near – Are SMB’s Using it Still Safe?
Windows XP support ends before its 13th birthday.
Symantec Security Response: The Future of Mobile Malware
New Android malware are using computers to get to your handsets.
How to Protect Your Social Media Account
Be safe online every day. As technology continues to become more integrated into our daily lives, there are settings and security features that can be used to ensure your information and digital identity remain under your control. It’s a social world The most dominating force...