- Blog Home
- Emerging Threats
Emerging Threats
Related articles
89 articles
Riskware refers to legitimate software that can potentially threaten your cybersecurity. Read our guide to learn how to spot and avoid riskware in 2023.
You can’t prevent a cyberattack or a data breach, but there are steps you can take to help prepare for and react to one.
Use this smishing guide to learn about how smishing attacks work, including real-life smishing examples, and smishing scam protection tips to elevate your mobile device security.
Consider this your go-to guide for advanced persistent threat protection, including how APT attacks work and APT attacks to watch for.
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
A look at 2019 data breaches so far, arranged by business sector, plus actions you can take help protect against identity theft.
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
In general, the first steps to remove malware for a Mac or PC are to disconnect from the internet and enter safe mode.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Until your Wi-Fi enabled devices have a security patch for the KRACK vulnerability here are some steps to take to help secure your devices.
If you decide to work remote, it’s important to keep cyber safety in mind. That means protecting your devices and data, just like you would in the workplace.
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
Selecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
A distributed denial-of-service attack is one of the most powerful weapons on the internet. A DDoS attack is a cyberattack on a server, service, website, or network that floods it with Internet traffic. The aim is to overwhelm the website or service with more traffic than the server or network can accommodate.
As U.S. businesses start to reopen, employees and employer can team up to help keep company data safe
Holiday cybercrime statistics are hard to break out, but it’s fair to say some cybercrimes are known to appear around holidays. Here’s what you need to know.
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Smishing is a form of phishing that involves a text message or phone number. It's becoming an emerging and growing threat in the world of online security. Read on to find out what it is and how you can protect yourself against it.
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit. To keep your computer and data safe, it’s smart to take proactive and reactive security measures.
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
A fake virus alert is a deceptive hacking tool. Learn how to remove fake virus pop-ups, spot warning signs, as well as tips to help keep your devices safe.
How do online scams work? Use this guide on different types of online scams to help protect your devices and data from internet scamming and other cyberthreats.
Social engineering is the act of tricking someone into divulging information or taking action, usually through technology. A typical hacker might look for a software vulnerability, but a social engineer could pose as a technical support person.
Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information.
Consider this your ultimate guide to watering hole attacks, including what is a watering hole attack, real-life examples, and watering hole prevention tips.
Learn about the different types of hackers that exist online and their motives. Plus, pore over a timeline of hacking’s evolution and tips to help keep you safe online.
Twitter hit with hack involving high-profile accounts of billionaires, celebrities, and politicians, in cryptocurrency scam. Learn what happened.
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
Use this overview of 102 ransomware statistics to learn about the latest ransomware attacks and how to better protect your personal devices and information.
Ransomware attacks targeting governments are rising, including everything from city agencies to school districts to police departments.
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who dont care if you prefer PC to Mac or vice versa. There...
This password attack protection guide overviews common types of password attacks, as well as password attack prevention tips to help improve your privacy and cybersecurity.
MyHeritage DNA testing and family tree website investigating email and password breach, resetting all user passwords.
The personal info of more than 10.6 million guests who stayed at MGM Resorts was exposed in a data breach and posted on a hacking forum.
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
You may have noticed growing reports in the media about the dangers of using USB memory sticks. A malicious USB device can install malware such as backdoor Trojans, information stealers and much more.
Hackers can set their sights on Ring and other home security cameras, and that has made some customers feel less than secure.
An overview of GPS spoofing, meaning when technology or a person alters data so that a device appears in a different location or time zone, and how to avoid it.
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
Here’s a sample of common election scams and advice for outwitting the scammers behind them.
A Denial of Service (DoS) attack can be easily engineered from nearly any location. Learn more about what it is and how it works.
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
Biometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?
Your vote counts. Before casting your ballot, take a look at these 7 tips for election security.
The 2020 U.S. elections face major cybersecurity threats. Learn what they are and what the U.S. is doing to protect elections from hacking.
Equifax has announced that cybercriminals have exploited a vulnerability in their website, allowing them to gain access to certain files. The data breach appears to have taken place from mid-May through July 2017.
An overview of what is a smurf attack, the parts that play into smurfing, how it results in DDoS attacks, plus pointers for smurf attack prevention
Twitter bots are automated Twitter accounts controlled by bot software. Learn what they do.
Also known as “executive phishing,” whaling attacks are something high-level executives and digital citizens alike should be aware of. Consider this your go-to guide about what is whaling, plus whaling protection tips.
T-Mobile has confirmed unauthorized access to its data and is investigating the extent of the incident, after reports that sensitive data of 100 million T-Mobile USA customers is for sale on the web.
Shareware is a type of software that is freely distributed to users. The intent of the software developer is to convert free users to paying customers in the future.
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
Password spraying is when cybercriminals guess the passwords of their potential victims, often on a large scale. Learn how to protect your credentials.
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
As more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks. Never download pirated ebooks and always buy books and digital content from legitimate retailers. Some ebooks may contain malicious software that can install malware, spyware, and viruses in your computer.
Data breaches, ransomware attacks, cryptojacking, threats to your connected devices all contribute to new rounds of cyber security facts, figures, and statistics. Do you find it hard to keep up? Let’s cherry-pick 10 cyber safety facts to help give you the big picture.
Cybercriminals use sophisticated tactics to commit crimes. It takes a village to catch a cybercriminal since the method of how they commit these crimes is so complicated. Law enforcement usually has to coordinate with government agencies, international partners, and private corporations.
Tax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
A fake virus alert is a deceptive hacking tool. Learn how to remove fake virus pop-ups, spot warning signs, as well as tips to help keep your devices safe.
Here’s a look at the challenges facing social media platforms and how you can steer clear of disinformation this season.
Use this smishing guide to learn about how smishing attacks work, including real-life smishing examples, and smishing scam protection tips to elevate your mobile device security.
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
Explore these 115 cybersecurity statistics to understand the latest cybercrime rates and cybersecurity trends currently shaping the hacking industry.
A guide covering just what is credential stuffing, how credential stuffing attacks occur, and methods for protecting your computer’s operating systems.
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
Over a billion stolen records have been found on the dark web. Find out more.
Deepfake videos could have serious implications during the 2020 election season. Learn why.
Many companies were unprepared to have employees work from home due to the coronavirus outbreak. These security steps can help.
As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are...
Tablets and smartphones can be vulnerable to online threats and need security software
Learn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.
Adware, or advertising supported software, displays unwanted advertisements on your computer
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Youve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
Deepfakes are designed to deceive viewers with manipulated, fake video and voice. Learn why they’re threatening and how you can spot them.
Since streaming video content has become mostly commonplace, cybercriminals have taken notice, and are spreading spyware and malware on many social media platforms via comments
Recently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
An overview of what is a smurf attack, the parts that play into smurfing, how it results in DDoS attacks, plus pointers for smurf attack prevention
Consider this your ultimate guide to malware, including a malware definition and ways to help protect yourself against malware.
Hacktivism is a new type of activism. Here’s an overview of the concept, as well as hacktivism groups that have made headlines through their attacks.
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
Product Features
Services & Support
Want more?
Follow us for all the latest news, tips and updates.