Cyberthreat

Cyberthreat Protection

Malware

Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

3 min read

Most popular in Cyberthreat Protection

August 08, 2018·4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Start Free Trial

Malware

What is a Trojan?

Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

August 08, 2018·4 min read
What Is A Computer Virus?

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…

August 08, 2018·2 min read
What is a botnet?

The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.

August 08, 2018·4 min read

Online Scams

Top 5 social media scams

Social media sites like twitter and facebook have a dark side. Phishing requests are a common ploy by cybercriminals. Beware of blindly clicking on shortened URLs. Check your antivirus and anti-spyware protection.

August 08, 2018·3 min read
Teach your kids to avoid online scams

Surfing the Internet means possible exposure to online scams. Learn the basics to teach your kids to avoid scams online.

August 08, 2018·2 min read
Social engineering scams on social media

Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.

August 08, 2018·3 min read
Protect yourself from mobile scams

With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine.

August 08, 2018·2 min read

Emerging Threats

Yahoo announces data breach affecting 500 million users

If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.

August 08, 2018·2 min read
What you need to do about the WPA2 Wi-Fi network vulnerability

It may take some time for the manufacturer of your devices to come up with a security patch for this. In the meantime, there are extra steps you can take to help secure your devices.

August 08, 2018·3 min read
What is an info-stealing ad library?

When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.

August 08, 2018·2 min read
Reported 5 million credit cards breached at Saks, Lord & Taylor

Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.

August 08, 2018·2 min read

How To

7 Do's and Don’ts of secure online tax filing

Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.

August 08, 2018·3 min read
Catch spyware before it snags you

Have you ever clicked on an intriguing ad or link while surfing the Web and had a barrage of pop-up windows flood your screen or your browser suddenly send you to a slew of unsavory sites?

August 08, 2018·2 min read
How to choose antivirus software: What you need to know

Learn how to choose antivirus software to protect your computer or mobile device against viruses, malware, phishing, ransomware and other threats.

August 08, 2018·3 min read
How to protect your new tech

The holiday season is the most wonderful time of the year, and a time when many receive new gadgets. If youre the type that regularly receives smartwatches, wearable tech, and other gadgets as gifts,...

August 08, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.