Emerging Threats
The teams at Norton, Symantec and LifeLock are fighting online crime 24x7x365
Norton teams up with Symantec’s Security Technology and Response (STAR) division, which is a global team of security engineers, virus hunters, threat analysts, malware analysts, and researchers that provide the underlying security technology, content, and support for all Symantec corporate and consumer security products. Our team of global threat analysts operates a follow-the-sun-model to provide 24x7 coverage to Symantec customers to track the latest developments on the threat landscape. Analysts continuously monitor a worldwide network of Symantec protected machines as well as a large-scale, global network of honey pots (machines designed to lure attackers). The group is Symantec’s and Norton’s eyes and ears when it comes to surveying and keeping a finger on the pulse of the Internet security threat landscape. With this partnership, we are able to provide you the latest, breaking news about all threats on the Internet landscape. Not only do we notify you of the latest outbreaks to be aware of, we also want to educate you about how to stay safe against these threats.
Some years ago, traditional antivirus was all that was needed to protect a computer from malware. However, with the huge shift in the threat landscape over the last few years, antivirus is just not enough to stay protected today. To address this, Norton has developed a collaborative partnership with the STAR team in order to alert readers as soon as a malware outbreak, data breach, fake app outbreak or other security incidents as they happen.
-
2019 data breaches: 4 billion records breached so far
Read MoreA look at 2019 data breaches so far, arranged by business sector, plus actions you can take help protect against identity theft.
-
How to protect your online privacy with a VPN
Read MoreDid you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
-
Phone hijacking: When criminals take over your phone and everything in it
Read MoreHackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
-
What are Denial of Service (DoS) attacks? DoS attacks explained
Read MoreDoS attacks generally take one of two forms. They either flood web services or crash them. Learn how they work.
-
What is a distributed denial of service attack (DDoS) and what can you do about them?
Read MoreA distributed denial-of-service (DDoS) can bring down websites. Here’s what you need to know.
-
Zero-day vulnerability: What it is, and how it works
Read MoreA zero-day vulnerability is a software issue with no known patches. Until a fix is available, cybercriminals could exploit it.
-
What is the Difference Between Black, White and Grey Hat Hackers?
Read MoreNot all hackers are inherently bad. When used in mainstream media, the word, hacker, is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their...
-
What you need to know about the Petya ransomware outbreak
Read MorePetya ransomware is spreading using the EternalBlue exploit similar to the WannaCry attack. Here's what to do when it comes to ransomware.
-
What is social engineering? Tips to help avoid becoming a victim
Read MoreDon’t let cyber con artists trick you into handing over personal information, money and more. Here’s what to know to help protect yourself.
-
What is a firewall?
Read MoreA firewall is a barrier protecting a device from dangerous and unwanted communications. Here’s what you need to know.
-
VPNFilter malware now targeting even more router brands. How to check if you're affected.
Read MoreVPNFilter malware targets over 500,000 routers. Here's how to help protect yourself.
-
Ransomware – what can you do about it
Read MoreMalicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
-
2020 election cybersecurity: Protecting U.S. elections against cybercrime
Read MoreThe 2020 U.S. elections face major cybersecurity threats. Learn what they are and what the U.S. is doing to protect the elections from hacking.
-
Data breach: Could your email account be compromised?
Read MoreHackers could take control of your email accounts after a data breach. Learn more.
-
Ransomware attacks targeting governments are on the rise
Read MoreRansomware attacks targeting governments are rising, including everything from city agencies to school districts to police departments.
-
What to do after 5 types of data breaches
Read MoreLearn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.
-
What is Formjacking and How Does it Work?
Read MoreFormjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information.
-
DoorDash data breach affects 4.9 million users — Have you been affected?
Read MoreDoorDash disclosed a data breach affecting 4.9 million people. Drivers, restaurants, and customers could be affected.
-
Biometric data breach: Database exposes fingerprints, facial recognition data of 1 million people
Read MoreBiometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?
-
Do tablets and smartphones need security software?
Read MoreTablets and smartphones can be vulnerable to online threats and need security software
-
Windows 10 compatibility with Norton products
Read MoreAs a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are...
-
How Do Cybercriminals Get Caught?
Read MoreCybercriminals use sophisticated tactics that make it extremely difficult for law enforcement alone to collect evidence, capture the suspect and prosecute them.
-
How a Gmail password stealing scam works
Read MoreSophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
-
10 cyber security facts and statistics for 2018
Read MoreCyber security threats evolve, and so do cyber security facts. Here are 10 cyber security facts for 2018 to help give you the big picture.
-
How to safely and securely use USB memory sticks
Read MoreYou may have noticed growing reports in the media about the dangers of using USB memory sticks. A malicious USB device can install malware such as backdoor Trojans, information stealers and much more.
-
Uber announces new data breach affecting 57 million riders and drivers
Read MoreRide sharing company Uber has announced that hackers have stolen the personal information of about 57 million customers and drivers.
-
Is it safe to download free ebooks online?
Read MoreAs more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks.
-
What is smishing?
Read MoreA form of phishing, smishing is when someone tries to trick you into giving them your private...
-
What Is Adware?
Read MoreAdware, or advertising supported software, displays unwanted advertisements on your computer
-
100 million credit card applications were recently exposed, some including Social Security numbers.
Read MoreLearn how to help protect yourself in the event of a data security incident.
-
FaceApp goes viral and raises privacy worries: What you need to know
Read MoreIf you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
-
Dark web scans and dark web monitoring can help you protect your identity
Read MoreDark web scans and dark web monitoring can help you protect your identity | Norton
-
Cyberthreat trends: 2019 cybersecurity threat review
Read MoreCyberthreat trends: 2019 cybersecurity threat review
-
Introducing Episode 2 of In Search Of The Most Dangerous Town On The Internet.
Read MoreLast year, the Norton team brought you a new look into cybercrime via the documentary In Search Of The Most Dangerous Town On The Internet. Through...
-
This Valentine’s Day, beware of fake apps as cybercriminals look to cash in on love.
Read MoreEvery February, users both single and coupled tend to increase their downloads of Valentines Day-centric apps.
-
Data leak exposes millions of bank loan and mortgage documents
Read MoreData leak exposes millions of bank loan and mortgage documents. Here’s what you need to know.
-
Targeted attacks now moving into the IoT and router space
Read MoreRecently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
-
Jigsaw ransomware wants to play a game, but not in a good way
Read MoreAn unusual strain of ransomware has shown up on the scene, and it isn’t playing nicely at all. Dubbed “Jigsaw,” the ransomware was created in early March and made its way to the black market a week later, selling for around $140 USD. So far, it seems that there has been minimal sales of the malware. Luckily, it is not widespread yet.
-
What is the dark web?
Read MoreThe dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
-
Massive data breach hits hospitality giant. Up to 500 million guests affected — Here’s what you can do
Read MoreMassive data breach at large hotel brand affects up to 500 million guests, potentially exposing them to identity theft and other crimes.
-
Election Day 2018: 7 security tips you should know before you vote
Read MoreYour vote counts. Before casting your ballot, take a look at these 7 tips for election security.
-
50 million Facebook accounts compromised — here’s what you need to know
Read MoreEverything you need to know about Facebook’s 50 million compromised accounts.
-
Hacking group Magecart claims another victim in a recent wave of data breaches
Read MoreThe threat group dubbed “Magecart” has been targeting the payment information entered into forms on various websites.
-
Hacker sentenced to 5 years for 2014 Yahoo breach
Read MoreA U.S. judge sentences a Canadian man to five years in prison for his role in the 2014 Yahoo data breach.
-
MyHeritage data breach exposes info of more than 92 million users
Read MoreMyHeritage DNA testing and family tree website investigating email and password breach, resetting all user passwords.
-
Meltdown and Spectre vulnerabilities affect billions of devices
Read MoreSpectre Next Generation — reportedly a new set of vulnerabilities in computer processors — could put your data at risk.
-
Alteryx Data Leak Exposes 123 Million Households: What You Need to Know
Read MoreMore than 120 million U.S. households had information exposed in a data leak, potentially raising the risk of identity theft for the impacted American families.
-
Fake WhatsApp Android apps downloaded over a million times
Read MoreSeveral malicious apps have been downloaded from the Google Play Store millions of times, disguised as legitimate versions of the popular messaging platform “WhatsApp.”
-
Make the switch to Norton — security you can trust
Read MoreIn today’s connected world, cybercrime is a reality we all face. Therefore, you must choose trustworthy companies to handle your information
-
What you need to do about the WPA2 Wi-Fi network vulnerability
Read MoreUntil your Wi-Fi enabled devices have a security patch for the KRACK vulnerability here are some steps to take to help secure your devices.
-
Update your version of Firefox now!
Read MoreA bug discovered in the Firefox web browser could allow attackers to gain access to files stored on a computer through malicious code injected into the browser’s built-in PDF viewer.
-
Two new vulnerabilities found in Mac OS X
Read MoreTwo vulnerabilities, which are security holes in software, in Mac OS X operating systems affecting OS X versions Mavericks 10.9.5 up to Yosemite 10.10.5 have been confirmed.
-
Third Adobe Flash exploit found in hacking team data dump
Read MoreLast week, the cyber attack against the hackers-for-hire firm Hacking Team, led to a theft of 400gb of data that exposed two Adobe Flash Player vulnerabilities.
-
Team GhostShell hacking group is back
Read MoreA group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities.
-
Scammers take advantage of Ashley Madison breach
Read MoreSince the large-scale August 19th data breach revealing millions of user profiles and email addresses from the Ashley Madison online dating site, we have found and blocked a surge in email spam activity related to the Ashley Madison data breach.
-
The personal impact of cybercrime
Read MoreThe Norton Cyber Security Insights Report sets out to understand how consumers are personally impacted by cybercrime and puts a human face on the headlines dominating the news.
-
PC or Mac: Which is more resistant to cyber threats?
Read MoreCyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who dont care if you prefer PC to Mac or vice versa. There...
-
Over 225,000 Apple ID credentials stolen from jailbroken iOS devices
Read MoreCybercriminals have reportedly stolen over 225,000 Apple ID account credentials from jailbroken iOS devices, using a type of malware called, “Keyraider”. The criminals have been using the stolen credentials to make in-app purchases with user accounts.
-
Norton at DefCon
Read MoreThis year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the...
-
New Windows zero-day exploit via cyberespionage group Sandworm discovered
Read MoreOn Tuesday October 14th, a new vulnerability was discovered in Microsoft Windows Operating Systems, affecting all supported versions of Windows, from Windows Vista Service Pack 2 up to Windows 8.1. According to the security firm, iSIGHT, this vulnerability has been exploited by a cyberespionage group known as Sandworm, to deliver malware to targeted organizations.
-
New Internet Explorer vulnerability found - update your version now
Read MoreThe security hole in Internet Explorer could allow an attacker to take over a computer. Once the attacker has gained control, they can potentially install programs, view, change, or delete data and more.
-
Is paying for antivirus software worth It?
Read MoreSince our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
-
Adobe Flash zero-day vulnerability discovered
Read MoreA new zero-day vulnerability has been discovered in Adobe Flash. Security researcher Kafeine reports that this vulnerability is currently being exploited in the wild.
-
Millions of customers’ credit card information may have been stolen in Sonic breach
Read MoreHot on the heels of another large data breach, Sonic, America’s Drive-In, appears to be the latest victim of a potential data breach. This could mean almost 5 million customers may end up with their credit card information traded in the underground economy.
-
Personal information of 143 million people may have been exposed in Equifax data breach
Read MoreEquifax has announced that cybercriminals have exploited a vulnerability in their website, allowing them to gain access to certain files. The data breach appears to have taken place from mid-May through July 2017.
-
Mazar BOT malware invades and erases Android devices
Read MoreAndroid smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
-
Netflix log in credentials being sold on the black market
Read MoreAttackers are setting their sights on stealing users Netflix credentials in order to sell them on the black market, providing access to the streaming service for less expensive prices.
-
Thousands of websites have been compromised with malicious code
Read MoreSymantec has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website.
-
Watch out for "free" movie and television scams during big events
Read MoreSince streaming video content has become mostly commonplace, cybercriminals have taken notice, and are spreading spyware and malware on many social media platforms via comments
-
Bug in Apple’s iOS and OSX AirDrop could allow malware to be installed silently
Read MoreA vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
-
Four tax scams to watch out for this tax season
Read MoreTax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
-
New variant of Android ransomware takes advantage of the lockscreen's user interface
Read MoreA new variant of Android ransomware has been discovered, which is displayed on the lockscreen’s user interface (UI). This threat, Android.Lockdroid.E, creates a lockscreen that appears more sophisticated and official by displaying fraudulent legal notices coupled with personal information gathered from the device.
-
iOS malware, XcodeGhost, infects millions of Apple Store customers
Read MoreiOS apps popular mainly in China have been infected with a piece of malware that can steal your data, and even get you to reveal things like usernames and passwords via phishing.
-
Major news-sites hit with large-scale malvertising campaign
Read MoreLast weekend several mainstream websites, fell victim to a massive malvertising campaign. The tainted ads in these websites may have directed thousands of unsuspecting users to a landing page hosting the notorious Angler Exploit Kit, a kit that stealthily installs crypto-ransomware and other malware on computers.
-
13 million MacKeeper user accounts exposed
Read MoreEarlier this week, white hat hacker Chris Vickery announced that he was able to gain access to over 13 million MacKeeper user accounts. A vulnerability was exploited in the company’s servers, which exposed the usernames, email addresses and other personal information of 13 million customers.
-
What to look for when buying antivirus software
Read MoreSelecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
-
What is bulletproof hosting?
Read MoreYouve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
-
Episode Two of "The Most Dangerous Town on the Internet"
Read MoreToday we are proud to announce the launch of the second installment in our documentary series The
-
First targeted iPhone spyware discovered: Update your iOS software immediately
Read MoreCyber espionage, also known as cyber spying, is grabbing a lot of headlines lately. The most recent incident affects Apple’s iOS. Researchers at Citizen Lab Have discovered that a highly sophisticated cyber espionage group has deployed a very rare, advanced form of spyware, which can break an iPhone wide open.
-
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Read MoreHundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.