Cyberthreat

Cyberthreat Protection

Malware

Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

3 min read

Most popular in Cyberthreat Protection

Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Malware

What Is A Computer Virus?
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Published: August 07, 2018 ·2 min read
Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Published: August 08, 2018 ·3 min read
What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published: August 08, 2018 ·4 min read
Webcam hacking
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Published: August 08, 2018 ·4 min read

Online Scams

Social engineering scams on social media
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Published: August 08, 2018 ·3 min read
How to spot online scareware scams
Today’s cybercriminals are more creative than ever, using continually-evolving techniques to worm their way into the computers (and wallets) of unsuspecting victims around the globe.
Published: August 08, 2018 ·3 min read
How to recognize and avoid tech support scams
A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait.
Published: August 08, 2018 ·3 min read
Avoiding ransomware scams on social media
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
Published: August 08, 2018 ·2 min read

Emerging Threats

Fight off malicious Pokemon GO apps with the help of Norton Mobile Security
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
Published: August 08, 2018 ·4 min read
Dropbox has verified that 68 million user credentials have been exposed
Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.
Published: August 08, 2018 ·4 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published: August 08, 2018 ·2 min read
Yahoo announces data breach affecting 500 million users
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Published: August 08, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.