- Blog Home
- Emerging Threats
Emerging Threats
Related articles
28 articles
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
What you need to know about deepfakes, romance scams, and crypto scams. Plus, some of the latest phishing pages we have caught.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Due to the coronavirus, many employers are having their employees to work from home. Learn tips to help keep your work devices secure.
Does antivirus software do its job well ? Know more.
Learn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.
It may take some time for the manufacturer of your devices to come up with a security patch for this. In the meantime, there are extra steps you can take to help secure your devices.
Not all hackers are inherently bad. When used in mainstream media, the word, hacker, is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their...
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Deepfakes are designed to deceive viewers with manipulated, fake video and voice. Learn why they’re threatening and how you can spot them.
Researchers at NortonLifeLock have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber.
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.
A Denial of Service (DoS) attack can be easily engineered from nearly any location. Learn more about what it is and how it works.
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
Biometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?
Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.
What happens when cryptocurrency becomes one of the most desired forms of money? Everyone takes notice. That includes hackers.
496,951 Google+ users’ full names, birth dates, gender, profile photos, addresses, occupation and relationship status were exposed.
Product Features
Services & Support
Want more?
Follow us for all the latest news, tips and updates.