Emerging Threats

28 articles

Video conferencing risks when working at home: 16 ways to avoid them

Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.

August 08, 2018·2 min read
FaceApp goes viral and raises privacy worries: What you need to know

If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.

August 08, 2018·4 min read
Norton email scams: Answers to Your Frequently Asked Questions (FAQs)

In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.

April 08, 2022·3 min read
What is a Deepfake Anyway?

If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.

May 02, 2022·2 min read
Fight off malicious Pokemon GO apps with the help of Norton Mobile Security

Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.

August 08, 2018·4 min read
April Consumer Cyber Safety Pulse Report

What you need to know about deepfakes, romance scams, and crypto scams. Plus, some of the latest phishing pages we have caught.

May 09, 2022·3 min read
Yahoo announces data breach affecting 500 million users

If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.

August 08, 2018·2 min read
Working remote due to the coronavirus? These 7 tips will help keep your connections secure

Due to the coronavirus, many employers are having their employees to work from home. Learn tips to help keep your work devices secure.

May 09, 2020·3 min read
What to look for when buying antivirus software

Does antivirus software do its job well ? Know more.

August 08, 2018·3 min read
What to do after 5 types of data breaches?

Learn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.

August 08, 2018·2 min read
What you need to do about the WPA2 Wi-Fi network vulnerability

It may take some time for the manufacturer of your devices to come up with a security patch for this. In the meantime, there are extra steps you can take to help secure your devices.

August 08, 2018·3 min read
What is the Difference Between Black, White and Grey Hat Hackers?

Not all hackers are inherently bad. When used in mainstream media, the word, hacker, is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their...

August 08, 2018·3 min read
What is an info-stealing ad library?

When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.

August 08, 2018·2 min read
What is a firewall and do you need one?

Firewalls can help keep your network, computer, and data safe and secure. Here’s how.

August 08, 2018·3 min read
Deepfakes: What they are and why they’re threatening

Deepfakes are designed to deceive viewers with manipulated, fake video and voice. Learn why they’re threatening and how you can spot them.

August 08, 2018·4 min read
NortonLifeLock discovery leads to malicious app that steals Viber photos and videos

Researchers at NortonLifeLock have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber.

August 08, 2018·2 min read
How to protect your online privacy with a VPN

Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.

August 08, 2018·4 min read
Is paying for antivirus software worth it?

Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.

August 08, 2018·2 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.

Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.

August 08, 2018·2 min read
Everything you need to know about a data breach

Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.

August 08, 2018·4 min read
Dropbox has verified that 68 million user credentials have been exposed

Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.

August 08, 2018·4 min read
What are Denial of Service (DoS) attacks? DoS attacks explained

A Denial of Service (DoS) attack can be easily engineered from nearly any location. Learn more about what it is and how it works.

August 08, 2018·4 min read
Cyberthreat trends: 15 cybersecurity threats for 2020

Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.

August 08, 2018·2 min read
Bank credential stealing Android malware is on the rise

Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.

August 08, 2018·4 min read
Biometric data breach: Database exposes fingerprints, facial recognition data of 1 million people

Biometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?

August 08, 2018·2 min read
Reported 5 million credit cards breached at Saks, Lord & Taylor

Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.

August 08, 2018·2 min read
Over half a million PCs infected as hackers go after cryptocurrency

What happens when cryptocurrency becomes one of the most desired forms of money? Everyone takes notice. That includes hackers.

August 08, 2018·3 min read
Google+ exposed data of hundreds of thousands of users—here’s what you need to know

496,951 Google+ users’ full names, birth dates, gender, profile photos, addresses, occupation and relationship status were exposed.

August 08, 2018·3 min read

Want more?

Follow us for all the latest news, tips and updates.