Malware

What is the Zeus virus and how does it work?
Zeus viruses live on your device and steal financial information — learn how to protect yourself.
Published: May 07, 2025 · 9 min read
How to remove a virus from an Android phone in 6 steps
Learn how to remove a virus from your Android easily with these six simple steps to secure your device.
Updated: April 08, 2025 · 12 min read
Can iPhones get viruses? Yes, learn how to remove them
iPhones are unlikely to get viruses, but it’s possible—especially if your phone is jailbroken. Learn more.
Updated: March 14, 2025 · 10 min read
Ransomware statistics: Facts and trends for 2025
Dig into 50+ surprising ransomware statistics to learn more about one of this year’s biggest cybersecurity threats.
Updated: March 05, 2025 · 13 min read
Malware: What it is, how it works, and how to get rid of it
Learn what malware is, how to check for it, and how to protect against harmful threats.
Updated: January 28, 2025 · 10 min read
How to spot and remove a fake virus alert
Learn how to remove a fake virus alert, spot the warning signs, and keep your devices safe.
Updated: January 27, 2025 · 11 min read
How to remove malware from a Mac or PC
Learn how to remove malware from your device before it can expose sensitive information to hackers.
Updated: January 24, 2025 · 12 min read
What is a computer worm? How they work and spread
Computer worms are a dangerous type of self-replicating malware. Here’s a guide to how they work and how to defend against them.
Updated: January 13, 2025 · 9 min read
Ransomware protection: What it is and how to protect yourself
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: December 31, 2024 · 14 min read
Malvertising: What it is and how to prevent it
Malvertising is the combination of malware and advertising. Find out how to prevent it and stay safe online.
Updated: December 27, 2024 · 8 min read
15 types of malware: real-world examples and protection tips
Learn about all the different types of malware, including spyware, adware, trojans, worms, viruses, ransomware, botnets, and more.
Updated: December 20, 2024 · 15 min read
Shareware: Types and potential risks
Learn about shareware, including what it is, how it works, different types, and what risks you need to protect yourself from in our guide.
Updated: November 18, 2024 · 10 min read
Is your computer haunted? No, it’s probably malware
Your computer isn’t haunted—it’s probably malware. Check out the signs of infection, and how to protect yourself from these digital ghosts.
Updated: October 07, 2024 · 7 min read
What is adware and how do you get rid of the invasive software?
Adware is an invasive malware that floods users with advertisements. Learn how adware can infect your devices—and how to remove it.
Updated: September 30, 2024 · 9 min read
Fake apps: What they are and how to spot them
Find out what fake apps are and how to protect yourself from them. Discover the types of fake apps, how to spot one, and what to do if you've downloaded one.
Published: September 30, 2024 · 10 min read
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Updated: August 20, 2024 · 10 min read
Logic bomb definition, examples, and protection
Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: August 09, 2024 · 7 min read
How to check for viruses on iPhone: A detection guide
Think your iPhone has a virus but don't know how to check? Follow this detection guide to learn how to check for viruses on iPhone.
Published: May 22, 2024 · 7 min read
What is a macro virus? + How to remove one
A macro virus is written in the same language used by Excel, Word, and similar programs. Learn how macro viruses work and how to spot them.
Updated: May 13, 2024 · 7 min read
Trojan viruses: Detecting and removing
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: May 08, 2024 · 6 min read
What is a zip bomb and how does it work?
Zip bombs look deceptively small but can expand to a massive size and overload your device. Learn how.
Published: April 02, 2024 · 6 min read
What are lateral movement attacks?
Hard to detect and harder to contain, lateral movement attacks start with a single device, then spread infection across a network. Here’s what you need to know about them.
Published: March 11, 2024 · 7 min read
Computer viruses: How they spread and tips to avoid them
What is a computer virus? Learn how computer viruses spread, how to spot them, and tips to keep them at bay.
Updated: February 29, 2024 · 6 min read
What are browser hijackers? Removal + prevention tips
Browser hijackers are a form of software that alters your internet experience. Follow this guide to learn more about browser hijackers and how to remove them.
Updated: February 20, 2024 · 7 min
What is a remote access Trojan? A cybersecurity guide
Remote access Trojans trick you into giving hackers complete control of your device. Learn how RATs work and how to prevent attacks.
Published: February 18, 2024 · 10 min
How to know if your computer has a virus: 9 warning signs
Think your computer is infected? Learn how to know if your computer has a virus, the signs to look out for, and how to respond.
Updated: February 18, 2024 · 9 min
Are you accidentally pirating software?
Software piracy isn’t always malicious. In fact, it’s surprisingly easy to do it accidentally. Here’s how to make sure you aren't doing it.
Published: January 31, 2024 · 4 min read
How to detect spyware and remove it
Find out how to detect spyware and safeguard your online activities. Learn to recognize spyware on Android, iOS, and computers, plus tips for how to get rid of it.
Published: January 02, 2024 · 18 min read
6 common types of ransomware you need to know about
There are currently six common types of ransomware, and they collectively contribute to millions of cybersecurity attacks globally each year. Learn more.
Published: December 15, 2023 · 16 min
What is antivirus? Definition, types, and benefits
Learn more about antivirus software, including how it works, the different types available, and its role in protecting your devices from viruses and malware.
Published: November 28, 2023 · 8 min
Can Macs get viruses? Yes. Here's how to protect yours
Can Macs get viruses? Follow this guide to learn how to keep your Mac safe from viruses, malware, and other threats that could harm your device.
Published: November 04, 2023 · 10 min
Can iPads get viruses? An iPad cybersecurity guide
iOS viruses are extremely rare, but iPads are still vulnerable to other types of malware, along with online privacy and security threats.
Published: November 03, 2023 · 13 min
What is Pegasus spyware + how to remove it from your mobile device?
Pegasus is smartphone spyware that surveils the mobile activity of criminals, but it's also been used against dissidents, journalists, and others.
Published: October 06, 2023 · 4 min
What is scareware + how to remove it
Scareware is invasive software that tries to frighten users into performing specific actions. Learn how to detect and remove these programs from your devices.
Published: September 06, 2023 · 7 min read
What is a botnet?
A botnet is a string of connected computers coordinated together to perform a task. Learn how they work and how you can help protect yourself.
Published: September 01, 2023 · 4 min read
What to do if you're a victim of malware
Trojan horses, bots, adware, ransomware, macro viruses, rogueware, spyware, worms and phishing attacks target Internet users every day. The more we use the Internet, the more vulnerable we are to threats. There are many security measures that Internet users can put in place to minimize putting themselves at risk from malicious attacks.
Published: September 01, 2023 · 4 min read
What is a rootkit? Detection + prevention tips
A rootkit is malware that grants attackers access to a device while remaining undetected. Follow his guide to learn how to detect and guard against rootkit attacks.
Published: July 21, 2023 · 4 min read
Spyware: What it is and how to protect yourself
Spyware is a type of malware that infiltrates your device and covertly gathers intel about you. Learn about spyware removal tips in this guide.
Published: July 20, 2023 · 3 min read
What is a keylogger? A total protection guide
Not sure what a keylogger is? Find out how a keylogger attack could affect you and how you can protect yourself and your device.
Published: July 20, 2023 · 4 min read
What is riskware and how to spot and avoid it
Riskware refers to legitimate software that can potentially threaten your cybersecurity. Read our guide to learn how to spot and avoid riskware.
Published: March 15, 2023 · 5 min read
19 signs of malware + how to cure the symptoms
Is your device acting weird? If so, it may be malware. Follow this guide to learn about the signs of malware and how to diagnose and treat a malware infection.
Published: November 22, 2022 · 2 min read
What is CryptoLocker? An overview + prevention tips
CryptoLocker is ransomware that encrypts your files and requests payment to decrypt them. To learn more about CryptoLocker and how it works, follow this guide.
Published: October 12, 2022 · 3 min read
How to avoid ransomware: 9-step guide
Trying to avoid ransomware? Use this nine-step guide to learn how to better avoid ransomware threats online.
Published: August 16, 2022 · 4 min read
What is a fake antivirus software? An overview of rogue security software
What is fake antivirus software? Follow this guide to learn more and discover helpful tips on how to spot and avoid fake antivirus scams online.
Published: July 01, 2022 · 4 min read
What are drive-by downloads + drive-by attack prevention tips
What are drive-by downloads? Use this complete guide on drive-by attacks to help protect your data from drive-by hacking and other dangerous online threats.
Published: February 14, 2022 · 4 min read
What is ransomware and how to help prevent ransomware attacks
Ransomware is a form of malicious software that locks and encrypts a victim’s computer or device data, then demands a ransom to restore access. In many cases, the victim must pay the cybercriminal within a set amount of time or risk losing access forever. If the attackers don’t give you the decryption key, you may be unable to regain access to your data or device.
Published: November 23, 2021 · 3 min read
What is a heuristic virus and how do I remove it?
Heuristic virus can refer to malware detected by heuristic analysis or the virus Heur.Invader, which compromises a device’s security and antivirus measures.
Published: September 17, 2021 · 4 min read
How ransomware can affect your small business
You're never too small to be the target of a ransomware attack. Learn tips for small business owners.
Published: August 06, 2021 · 3 min read
Malware attacks: What you need to know
Malware is software that cyber attackers develop to gain access or cause damage to a computer or network, usually without the victim’s knowledge. Different types of malware include viruses, spyware, ransomware, and Trojan horses. Malware attacks can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.
Published: July 17, 2019 · 3 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published: August 08, 2018 · 3 min read
Virus FAQ
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: August 08, 2018 · 3 min read
What is fileless malware and how does it work?
Fileless malware uses your system’s software, applications and protocols to install and execute malicious activities. Learn more.
Published: August 08, 2018 · 4 min read
What is a Trojan downloader?
A Trojan downloader is a type of Trojan horse that downloads and installs files, often malicious programs.
Published: August 08, 2018 · 2 min read
What is a PUA (Potentially Unwanted Application) or PUP (Potentially Unwanted Program)?
Potentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package.
Published: August 08, 2018 · 2 min read
Avoiding ransomware scams on social media
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
Published: August 08, 2018 · 2 min read
Bug in Apple’s iOS and OSX AirDrop could allow malware to be installed silently
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
Published: August 08, 2018 · 4 min read
Mazar BOT malware invades and erases Android devices
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
Published: August 08, 2018 · 4 min read
6 tips to avoid getting a virus on your devices from the internet
How do you avoid getting a virus on your devices from the internet? Here’s our tips to help keep you protected.
Published: August 08, 2018 · 3 min read
How do firewalls prevent computer viruses?
Firewalls function as a critical line of defense against cybercriminals. Know what they protect and how they work.
Published: August 08, 2018 · 4 min read
What is mobile ransomware?
Mobile ransomware is a form of malware that steals sensitive data or locks a device and then demands payment before returning the data or unlocking the device.
Published: August 08, 2018 · 4 min read

Want more?

Follow us for all the latest news, tips, and updates.