Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Explore topics
14 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Today’s cybercriminals are more creative than ever, using continually-evolving techniques to worm their way into the computers (and wallets) of unsuspecting victims around the globe.
A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait.
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
It may take some time for the manufacturer of your devices to come up with a security patch for this. In the meantime, there are extra steps you can take to help secure your devices.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank account numbers, Social Security numbers, birthdates, full names and addresses. They can commit identity theft with Social Security numbers, sell credit and debit card numbers to other cybercriminals or bleed bank accounts dry using bank account information.
Have you ever clicked on an intriguing ad or link while surfing the Web and had a barrage of pop-up windows flood your screen or your browser suddenly send you to a slew of unsavory sites?
The holiday season is the most wonderful time of the year, and a time when many receive new gadgets. If youre the type that regularly receives smartwatches, wearable tech, and other gadgets as gifts,...
Many online users are still being confronted with similar messages to the above thanks to a type of malware called ransomware. The scam works by using malware to disable the victims’ computers until they pay a ransom to restore access.
Want more?
Follow us for all the latest news, tips and updates.