Security 101

Take a crash course
on Internet safety

Knowledge is absolutely the first line of defense.
For your first assignment, start with the Internet safety
basics, learn the jargon and dig into the how-tos.

How to Be Pirate Free

Software piracy is a serious matter. Not only is counterfeit software illegal, but it also can damage your PC and compromise its security.

Read more

Spear Phishing: Scam, Not Sport

Spear phishing is an email that appears to be from an individual or business that you know. But it isn't. It's from a cybercriminal who hopes to trick you into divulging your passwords.

Read more

Why Software Security Updates Are Vital

Computer software used to be static, and updates were few and far between. Now frequent updates are routine--and critical. Ignoring the latest updates can have serious consequences.

Read more

 

Top Prevention Tips

Cybercrime prevention doesn't have to be hard. When you're armed with a little technical advice and common sense, you can avoid many types of cyberattacks. Remember, online criminals are trying to make money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can keep your computer and your identity safe.

  • Protect your computer with security software.
  • Keep your computer current with the latest patches and updates.
  • Make sure your computer is configured securely.
  • Choose strong passwords and keep them safe.

Read more

Internet Security Glossary

Learn your Internet security ABCs with this glossary of terms. These definitions will educate you and help you protect yourself online.

Botnet or zombie armies
A group of computers that have been compromised and brought under the control of an individual. The individual uses malware installed on the compromised computers to launch denial-of-service attacks, send spam, or perpetrate other malicious acts.

DoS
Denial-of-Service. An attack on a computer or network in which bandwidth is flooded or resources are overloaded to the point where the computer or network's services are unavailable to clients. Can also be carried out by malicious code that simply shuts down resources.

Pharming
An attempt to defraud Internet surfers by hijacking a website's domain name, or URL, and redirecting users to an imposter website where fraudulent requests for information are made.

Router
A hardware device that connects two networks and directs traffic from one network to the appropriate destination on the other. Often used to connect a network to the Internet, some routers have network firewalls and other features built into them.

Trojan horse
A malicious program disguised as legitimate software; often gives someone else the power to take remote control of your computer; may also attack data or systems. Unlike viruses and worms, Trojan horses cannot replicate or propagate themselves and therefore must rely on other methods of distribution.

Learn more

Identity Theft: A Primer

Learn how to protect your personal information online and react if you're a victim of identity theft.

Learn more

An Identity Theft Primer

Protect Yourself with Norton™

Norton 360™

Norton 360™

Ultimate peace of mind for what you do online.

Learn more
Norton™ Internet Security

Norton™ Internet Security

Complete peace of mind for where you go and what you do online.

Learn more