Emerging Threats

26 articles

Trust me, I’m (not) real: deepfakes fuel the latest scams
Deepfake scams are rising—learn how fake influencers trick users into malware and fraud, and how to stay safe.
Published: May 27, 2025 · 5 min read
Deep web vs. dark web: Key differences and definition
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
Published: September 01, 2023 · 4 min read
Zero-day vulnerability: What it is, and how it works
A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit. To keep your computer and data safe, it’s smart to take proactive and reactive security measures.
Published: September 01, 2023 · 4 min read
What is a firewall? Firewalls explained and why you need one
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Published: September 01, 2023 · 3 min read
Phictionary – the phishing dictionary every digital citizen should read
Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
Published: July 11, 2023 · 3 min
What is the difference between black, white and gray hat hackers?
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Published: February 25, 2022 · 3 min read
Cyberattacks on the rise: What to do before and after a cyberattack or data breach
You can’t prevent a cyberattack or a data breach, but there are steps you can take to help prepare for and react to one.
Published: December 17, 2021 · 3 min read
What is a zero-day exploit?
Get an overview of what a zero-day exploit is and how zero-day attacks work. Plus, learn about other zero-day definitions from the Norton blog.
Published: September 03, 2021 · 3 min read
115 cybersecurity statistics and trends you need to know in 2021
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
Published: August 09, 2021 · 2 min read
What is the dark web? The dark web defined and explained
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
Published: June 18, 2021 · 2 min read
15 work-from-home security tips: Security best practices for remote workers
If you decide to work remote, it’s important to keep cyber safety in mind. That means protecting your devices and data, just like you would in the workplace.
Published: May 12, 2021 · 3 min read
5 election scams to avoid
Here’s a sample of common election scams and advice for outwitting the scammers behind them.
Published: October 05, 2020 · 4 min read
How to spot deepfake videos — 15 signs to watch for
Deepfake videos could have serious implications during the 2020 election season. Learn why.
Published: August 12, 2020 · 3 min read
What is a distributed denial of service attack (DDoS) and what can you do about them?
A distributed denial-of-service attack is one of the most powerful weapons on the internet. A DDoS attack is a cyberattack on a server, service, website, or network that floods it with Internet traffic. The aim is to overwhelm the website or service with more traffic than the server or network can accommodate.
Published: July 23, 2020 · 4 min read
Ransomware – what can you do about it
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
Published: August 08, 2018 · 3 min read
10 cyber security facts and statistics for 2018
Data breaches, ransomware attacks, cryptojacking, threats to your connected devices all contribute to new rounds of cyber security facts, figures, and statistics. Do you find it hard to keep up? Let’s cherry-pick 10 cyber safety facts to help give you the big picture.
Published: August 08, 2018 · 3 min read
What Is Adware?
Adware, or advertising supported software, displays unwanted advertisements on your computer
Published: August 08, 2018 · 2 min read
Four tax scams to watch out for this tax season
Tax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
Published: August 08, 2018 · 2 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published: August 08, 2018 · 2 min read
How to protect your online privacy with a VPN
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
Published: August 07, 2018 · 4 min read
What to look for when buying antivirus software
Selecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
Published: August 07, 2018 · 3 min read
How to safely and securely use USB memory sticks
You may have noticed growing reports in the media about the dangers of using USB memory sticks. A malicious USB device can install malware such as backdoor Trojans, information stealers and much more.
Published: August 07, 2018 · 2 min read
How a Gmail password stealing scam works
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
Published: January 18, 2018 · 2 min read
What is smishing?
Smishing is a form of phishing that involves a text message or phone number. It's becoming an emerging and growing threat in the world of online security. Read on to find out what it is and how you can protect yourself against it.
Published: January 18, 2018 · 3 min read
How Do Cybercriminals Get Caught?
Cybercriminals use sophisticated tactics to commit crimes. It takes a village to catch a cybercriminal since the method of how they commit these crimes is so complicated. Law enforcement usually has to coordinate with government agencies, international partners, and private corporations.
Published: January 18, 2018 · 4 min read
Is it safe to download free ebooks online?
As more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks. Never download pirated ebooks and always buy books and digital content from legitimate retailers. Some ebooks may contain malicious software that can install malware, spyware, and viruses in your computer.
Published: January 18, 2018 · 2 min read

Want more?

Follow us for all the latest news, tips, and updates.