Emerging Threats

31 articles

What 2024 holds for the future of cybersecurity
Norton’s researchers released their 2024 cybersecurity predictions. See how AI is predicted to impact the landscape of cybersecurity.
Published: December 20, 2023 ·8 min read
Deep web vs. dark web: What’s the difference?
What’s the difference between the deep web vs. the dark web? Get an overview of they work and tips on surfing the deep web and dark web.
Published: December 14, 2023 ·4 min read
April Consumer Cyber Safety Pulse Report
What you need to know about deepfakes, romance scams, and crypto scams. Plus, some of the latest phishing pages we have caught.
Published: May 09, 2022 ·3 min read
What is a Deepfake Anyway?
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Published: May 02, 2022 ·2 min read
Norton email scams: Answers to Your Frequently Asked Questions (FAQs)
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information.
Published: April 08, 2022 ·3 min read
Working remote due to the coronavirus? These 7 tips will help keep your connections secure
Due to the coronavirus, many employers are having their employees to work from home. Learn tips to help keep your work devices secure.
Published: May 09, 2020 ·3 min read
Reported 5 million credit cards breached at Saks, Lord & Taylor
Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.
Published: August 08, 2018 ·2 min read
Everything you need to know about a data breach
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Published: August 08, 2018 ·4 min read
Google+ exposed data of hundreds of thousands of users—here’s what you need to know
496,951 Google+ users’ full names, birth dates, gender, profile photos, addresses, occupation and relationship status were exposed.
Published: August 08, 2018 ·3 min read
Over half a million PCs infected as hackers go after cryptocurrency
What happens when cryptocurrency becomes one of the most desired forms of money? Everyone takes notice. That includes hackers.
Published: August 08, 2018 ·3 min read
Bank credential stealing Android malware is on the rise
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
Published: August 08, 2018 ·4 min read
Dropbox has verified that 68 million user credentials have been exposed
Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.
Published: August 08, 2018 ·4 min read
How to protect your online privacy with a VPN
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
Published: August 08, 2018 ·4 min read
Biometric data breach: Database exposes fingerprints, facial recognition data of 1 million people
Biometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?
Published: August 08, 2018 ·2 min read
What to look for when buying antivirus software
Selecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
Published: August 08, 2018 ·3 min read
What to do after 5 types of data breaches?
Learn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.
Published: August 08, 2018 ·2 min read
What are Denial of Service (DoS) attacks? DoS attacks explained
Many major companies have been the focus of DoS attacks. A DoS attack can be easily engineered from nearly any location. Attackers include hackers, profit-motivated cybercriminals, and nation states.
Published: August 08, 2018 ·4 min read
What is an info-stealing ad library?
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Published: August 08, 2018 ·2 min read
Is paying for antivirus software worth it?
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
Published: August 08, 2018 ·2 min read
Fight off malicious Pokemon GO apps with the help of Norton Mobile Security
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
Published: August 08, 2018 ·4 min read
Yahoo announces data breach affecting 500 million users
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Published: August 08, 2018 ·2 min read
Cyberthreat trends: 15 cybersecurity threats for 2020
Expect to hear more about these emerging and existing cybersecurity threats and trends this year.
Published: August 08, 2018 ·2 min read
Deepfakes: What they are and why they’re threatening
Deepfakes are designed to deceive viewers with manipulated, fake video and voice. Learn why they’re threatening and how you can spot them.
Published: August 08, 2018 ·4 min read
What is the Difference Between Black, White and Grey Hat Hackers?
Hackers are generally categorized by the type of metaphorical “hat” they don: “white hat”, “grey hat” and “black hat.” The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat. White hat hackers employ the same methods of hacking as black hats, with one exception - they do it with permission from the owner of the system first.
Published: August 08, 2018 ·3 min read
NortonLifeLock discovery leads to malicious app that steals Viber photos and videos
Researchers at NortonLifeLock have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber.
Published: August 08, 2018 ·2 min read
FaceApp goes viral and raises privacy worries: What you need to know
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
Published: August 08, 2018 ·4 min read
What you need to do about the WPA2 Wi-Fi network vulnerability
Until your Wi-Fi enabled devices have a security patch for the KRACK vulnerability here are some steps to take to help secure your devices.
Published: August 08, 2018 ·3 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published: August 08, 2018 ·2 min read
What is a firewall and do you need one?
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Published: August 08, 2018 ·3 min read
Video conferencing risks when working at home: 16 ways to avoid them
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
Published: August 08, 2018 ·2 min read
What is the difference between black, white and gray hat hackers?
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Published: August 08, 2018 ·4 min read

Want more?

Follow us for all the latest news, tips and updates.