Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Explore topics
14 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Social media sites like twitter and facebook have a dark side. Phishing requests are a common ploy by cybercriminals. Beware of blindly clicking on shortened URLs. Check your antivirus and anti-spyware protection.
Surfing the Internet means possible exposure to online scams. Learn the basics to teach your kids to avoid scams online.
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Ticketmaster UK Breach: Customers’ Personal Data & Credit Card Information Possibly Stolen
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Want more?
Follow us for all the latest news, tips and updates.