Cyberthreat

Cyberthreat Protection

Malware

Most popular in Cyberthreat Protection

How to tell if your phone is tracked, tapped, or monitored by spy software
Worried that your phone is being tapped? Read more of our expert advice on how to tell if your phone is tapped, tracked, or monitored by spy software.
Published: December 06, 2023 ·11 min
What is the dark web and how do you access it?
The dark web sounds ominous, but many people use it for enhanced privacy and security. Learn how to access it plus tips to stay safe while browsing.
Published: July 19, 2023 ·3 min read
Is my phone listening to me? Yes, here’s why and how to stop it
Is my phone listening to me? Yes. Read more from the Norton blog about why it happens and how to help stop it.
Published: June 13, 2023 ·2 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Malware

Lateral movement attacks: What they are and why you should care
Hard to detect and harder to contain, lateral movement attacks start with a single device, then spread infection across a network. Here’s what you need to know about them.
Published: March 11, 2024 ·7 min read
Computer viruses: How they spread and tips to avoid them
What is a computer virus? Learn how computer viruses spread, how to spot them, and tips to keep them at bay.
Updated: February 29, 2024 ·6 min read
What are browser hijackers? Removal + prevention tips
Browser hijackers are a form of software that alters your internet experience. Follow this guide to learn more about browser hijackers and how to remove them.
Updated: February 20, 2024 ·7 min
What is a remote access Trojan? A cybersecurity guide
Remote access Trojans trick you into giving hackers complete control of your device. Learn how RATs work and how to prevent attacks.
Published: February 18, 2024 ·10 min

Try our malware removal tools for free

Try our malware removal tools for free

  • Virus scanner and removal tool

    Use our virus cleaner Norton AntiVirus Plus to help scan and protect your device in just four simple steps.

  • Spyware detection and removal tool

    Use Norton 360 Standard to help find and remove spyware and other malicious software from your device.

  • Malware scanner and removal tool

    More than just a malware removal tool, Norton 360 Standard packs a suite of online security features.

Online Scams

Clone phishing: What it is and how to prevent it
In clone phishing scams, cybercriminals send fake messages from real brands to steal your personal information.
Updated: March 23, 2024 ·10 min read
DDoS? Botnet? 2FA? What does it all mean? We can explain
Sometimes we get a little caught up in the verbiage of Cyber Safety. Despite the language of the trade, the concepts are actually easy to understand.
Published: March 20, 2024 ·4 min read
Who TF Did I Marry?: What we all can learn from Reesa Teesa’s epic tale of love and deception
Reesa Teesa's wild series"Who TF Did I Marry?” had us all glued to our phones. Here's what we can learn from her experience.
Published: February 23, 2024 ·5 min
What is vishing? Tips to spot and avoid voice phishing scams
What is vishing? Learn more about vishing scams, how to spot voice-based phishing, and tips to avoid these cyberattacks.
Updated: February 20, 2024 ·5 min read

Emerging Threats

What is smishing? How to spot + avoid an attack
Smishing is a type of phishing carried out via text message. Read this guide to learn how smishing works, warning signs, and how to stay safe.
Updated: February 20, 2024 ·9 min
Watering hole attack: definition + prevention tips
Learn about watering hole attacks and how to protect yourself online. Explore prevention tips and examples of these targeted cyber threats.
Updated: February 02, 2024 ·11 min
What is a brute force attack?
Learn how to protect yourself online with our guide to brute force attacks. Understand the types, tools, and defense strategies for this prevalent cyber threat.
Updated: February 01, 2024 ·10 min read
Credential stuffing: Examples and 6 prevention tips
Find out what credential stuffing attacks look like and how they work, and discover reliable strategies for prevention.
Published: January 19, 2024 ·8 min read

How To

How to wipe a hard drive on Windows + Mac devices
Ready to wipe your hard drive? Learn how to wipe a hard drive on Windows or Mac to give your computer a fresh start.
Updated: April 02, 2024 ·13 min read
Why is my computer fan so loud + how to quiet it
If your computer fan is loud, your device may need a fix. Learn about the causes of a noisy fan and how to fix it with our guide.
Published: April 02, 2024 ·8 min read
Why is my computer overheating? + How to fix it
Broken fans, malware, and outdated software can cause your computer to overheat. Learn why your computer is overheating.
Published: April 02, 2024 ·9 min read
How to clean your PC software and hardware: A total guide
Is your computer overdue for a deep clean? Follow this guide to learn how to clean PC hardware and software, from cleaning your keyboard to deleting unused files.
Published: April 02, 2024 ·10 min read

Want more?

Follow us for all the latest news, tips and updates.