Cyberthreat

Cyberthreat Protection

Malware

Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

3 min read

Most popular in Cyberthreat Protection

Published August 08, 2018 ·4 min read
Published August 08, 2018 ·4 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Malware

What Is A Computer Virus?
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Published August 07, 2018 ·2 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published August 08, 2018 ·3 min read
What is cryptojacking? How it works and how to help prevent it
Cryptojacking is the unauthorized use of your computer and devices by cybercriminals in order to mine for cryptocurrency.
Published August 08, 2018 ·3 min read
What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published August 08, 2018 ·4 min read

Online Scams

Social engineering scams on social media
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Published August 08, 2018 ·3 min read
How to spot online scareware scams
Today’s cybercriminals are more creative than ever, using continually-evolving techniques to worm their way into the computers (and wallets) of unsuspecting victims around the globe.
Published August 08, 2018 ·3 min read
How to recognize and avoid tech support scams
A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait.
Published August 08, 2018 ·3 min read
Avoiding ransomware scams on social media
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
Published August 08, 2018 ·2 min read

Emerging Threats

What is an info-stealing ad library?
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Published August 08, 2018 ·2 min read
Bank credential stealing Android malware is on the rise
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
Published August 08, 2018 ·4 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published August 08, 2018 ·2 min read
Norton email scams: Answers to Your Frequently Asked Questions (FAQs)
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
Published April 28, 2022 ·3 min read

How To

Spam, spam, go away
Spam. In some ways, it's the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it's also a pervasive problem that's clogging and overwhelming the Internet's email systems. Spam accounts for approximately 80 percent of worldwide email volume.
Published August 08, 2018 ·4 min read
What to do if you become involved in a data breach
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank account numbers, Social Security numbers, birthdates, full names and addresses. They can commit identity theft with Social Security numbers, sell credit and debit card numbers to other cybercriminals or bleed bank accounts dry using bank account information.
Published August 08, 2018 ·4 min read
Catch spyware before it snags you
Have you ever clicked on an intriguing ad or link while surfing the Web and had a barrage of pop-up windows flood your screen or your browser suddenly send you to a slew of unsavory sites?
Published August 08, 2018 ·2 min read
How to protect your new tech
The holiday season is the most wonderful time of the year, and a time when many receive new gadgets. If youre the type that regularly receives smartwatches, wearable tech, and other gadgets as gifts,...
Published August 08, 2018 ·4 min read

Want more?

Follow us for all the latest news, tips and updates.