23 articles

How to get rid of iPhone viruses
If you have a virus on your iPhone, there are easy ways to get rid of it. Find out how to remove iPhone viruses here.
Published: June 17, 2024 ·6 min read
Trojan viruses: Detecting and removing
Help protect your device against Trojan viruses. Learn effective ways and essential tips to defend against malware and other threats.
Published: May 08, 2024 ·6 min read
Famous computer viruses: A historical look at notable cyberthreats
Learn about the most famous computer viruses and their impact, including examples and the history of these cyberthreats.
Published: March 22, 2024 ·6 min read
Spyware: What it is and how to protect yourself
Spyware is a type of malware that infiltrates your device and covertly gathers intel about you. Learn about spyware removal tips in this guide.
Published: July 20, 2023 ·3 min read
Spear phishing: A definition plus differences between phishing and spear phishing
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Published: June 01, 2022 ·3 min read
What is Grayware?
Grayware can affect your device’s performance and compromise your security online, as well as being a nuisance.
Published: May 12, 2022 ·4 min read
January Consumer Cyber Safety Pulse Report
What you need to know about Covid and Popular Shows scams, plus online tracking, and the 2021 year’s greatest hacks
Published: January 25, 2022 ·2 min read
6 cybersecurity predictions for 2022 – from Norton Labs
Get ready for more hacking, more scammers, and a bigger need for online security
Published: January 19, 2021 ·3 min read
IP spoofing: What is it and how does it work?
IP spoofing allows cybercriminals to infect your computer with malware, steal your sensitive data, and crash your server, often without detection.
Published: November 25, 2020 ·3 min read
What is cyber security? What you need to know
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
Published: August 09, 2018 ·4 min read
Webcam hacking
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·2 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published: August 08, 2018 ·3 min read
Virus FAQ
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: August 08, 2018 ·3 min read
OS X malware
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
Published: August 08, 2018 ·2 min read
4 things to do if your email account is hacked
Learn what to do if your email account has been hacked so you can stop scammers from targeting your contact list with money scams, malware, and more.
Published: August 08, 2018 ·2 min read
Macro viruses
A macro virus is defined as “a computer virus written in the same macro language used for software applications, such as word processors.”
Published: August 08, 2018 ·4 min read
Malware 101: How do I get malware? Complex attacks
In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about…
Published: August 08, 2018 ·3 min read
Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, Symantec Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Published: August 08, 2018 ·3 min read
How Norton keeps you shaded from silent but deadly threats
On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced (link is external) that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware.
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·3 min read
What is a botnet?
The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.
Published: August 08, 2018 ·4 min read
What Is A Computer Virus?
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Published: August 07, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.