Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Explore topics
14 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Today’s cybercriminals are more creative than ever, using continually-evolving techniques to worm their way into the computers (and wallets) of unsuspecting victims around the globe.
A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements social engineering and fear tactics in order to get the victim to take the bait.
Surfing the Internet means possible exposure to online scams. Learn the basics to teach your kids to avoid scams online.
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank account numbers, Social Security numbers, birthdates, full names and addresses. They can commit identity theft with Social Security numbers, sell credit and debit card numbers to other cybercriminals or bleed bank accounts dry using bank account information.
Many online users are still being confronted with similar messages to the above thanks to a type of malware called ransomware. The scam works by using malware to disable the victims’ computers until they pay a ransom to restore access.
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace.
Online fraud is one of fastest growing crimes of our time. The ability to be anonymous, and the fact that it can be performed anywhere in the world makes it very difficult, if not impossible, for law enforcement to curb it.
Want more?
Follow us for all the latest news, tips and updates.