SkipToMainContent

Emerging Threats

The teams at Norton, NortonLifelock and LifeLock are fighting online crime 24x7x365

 

Norton teams up with NortonLifelock’s Security Technology and Response (STAR) division, which is a global team of security engineers, virus hunters, threat analysts, malware analysts, and researchers that provide the underlying security technology, content, and support for all NortonLifelock corporate and consumer security products. Our team of global threat analysts operates a follow-the-sun-model to provide 24x7 coverage to NortonLifelock customers to track the latest developments on the threat landscape. Analysts continuously monitor a worldwide network of NortonLifelock protected machines as well as a large-scale, global network of honey pots (machines designed to lure attackers). The group is NortonLifelock’s and Norton’s eyes and ears when it comes to surveying and keeping a finger on the pulse of the Internet security threat landscape. With this partnership, we are able to provide you the latest, breaking news about all threats on the Internet landscape. Not only do we notify you of the latest outbreaks to be aware of, we also want to educate you about how to stay safe against these threats.

Some years ago, traditional antivirus was all that was needed to protect a computer from malware. However, with the huge shift in the threat landscape over the last few years, antivirus is just not enough to stay protected today. To address this, Norton has developed a collaborative partnership with the STAR team in order to alert readers as soon as a malware outbreak, data breach, fake app outbreak or other security incidents as they happen.

  • IoT

    Learn about emerging threats to your Internet connected devices, and ways you can keep your home network secure.

    Read More
  • Mobile

    A mobile device is prone to many online threats. Learn about the various types of mobile device cyberthreats and what solutions are available to be safer on mobile.

    Read More
  • Privacy

    Equip yourself with best practices to take control of what you share online. Read articles about how to keep your online activity and identity private.

    Read More