Learn how to protect yourself online with our guide to brute force attacks. Understand the types, tools, and defense strategies for this prevalent cyber threat.
Credential stuffing is a cybercrime where bad actors try to use one of your logins on multiple accounts. Learn how to protect yourself from password stuffing
Hackers wage whaling attacks against high-level executives to steal money and access confidential data. Read on to learn how you can identify and stop attacks.
Cryptography encrypts messages by turning them into “ciphertext” but hackers may exploit flaws to release private data—learn how to protect your communications.
We’re demystifying what deepfakes are and how they affect you. Learn about their creation, use, detection, legality, and how to better protect your identity.
An attack surface refers to all of the potential security risks that leave you open to cyberattacks. Learn about your attack surface and how to reduce it.
This Norton Cyber Safety Pulse Report explores new takes on old scams that are still prevalent in today's digital landscape and advice for how to help avoid falling victim.
Norton Labs reports on the latest TikTok scams targeting younger generations. Check out the latest tactics scammers are using, including deepfakes and bitcoin lures.
Simply put, hacktivism is hacking and activism combined. Follow this guide to learn more about hacktivism, common motivations, and famous examples in the news.
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit. To keep your computer and data safe, it’s smart to take proactive and reactive security measures.
If you spot one of these in your email inbox, it’s a red flag. We’ve got some tips to help you spot when an email is true—and when it’s just playing you.
Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
A script kiddie is an amateur hacker who relies on prewritten scripts. Read along to learn more about script kiddies, how they work, and how to stay safe.
Follow this helpful guide to help learn more about pass the hash attacks, how they work, real-life examples, and how you can help to mitigate an attack.
Hacking groups can be a major threat to your business and are widely active on the web today. Learn about the top 15 hacker groups to watch for in this guide.
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
Cryptojacking refers to the illegal use of stolen computing power to mine cryptocurrency. Read our article to learn how to detect and prevent this cybercrime.
If someone asks you to let them into a restricted area, it could be a tailgating attack. Read along to learn more about tailgating attacks and how to stay safe.
If you use public Wi-Fi, you may be at risk of an evil twin attack. So how do these attacks work, and how can you spot and avoid them? Read along to find out.
This password attack protection guide overviews common types of password attacks, as well as password attack prevention tips to help improve your privacy and cybersecurity.
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
Holiday cybercrime statistics are hard to break out, but it’s fair to say some cybercrimes are known to appear around holidays. Here’s what you need to know.
Learn about GPS spoofing and how it poses risks to your online security. Discover its legitimate and illegal uses, dangers, and ways to protect yourself.
T-Mobile has confirmed unauthorized access to its data and is investigating the extent of the incident, after reports that sensitive data of 100 million T-Mobile USA customers is for sale on the web.
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
If you decide to work remote, it’s important to keep cyber safety in mind. That means protecting your devices and data, just like you would in the workplace.
A distributed denial-of-service attack is one of the most powerful weapons on the internet. A DDoS attack is a cyberattack on a server, service, website, or network that floods it with Internet traffic. The aim is to overwhelm the website or service with more traffic than the server or network can accommodate.
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
Data breaches, ransomware attacks, cryptojacking, threats to your connected devices all contribute to new rounds of cyber security facts, figures, and statistics. Do you find it hard to keep up? Let’s cherry-pick 10 cyber safety facts to help give you the big picture.
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who dont care if you prefer PC to Mac or vice versa. There...
Recently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
Since streaming video content has become mostly commonplace, cybercriminals have taken notice, and are spreading spyware and malware on many social media platforms via comments
Equifax has announced that cybercriminals have exploited a vulnerability in their website, allowing them to gain access to certain files. The data breach appears to have taken place from mid-May through July 2017.
As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are...
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information
Youve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
Tax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
Selecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
You may have noticed growing reports in the media about the dangers of using USB memory sticks. A malicious USB device can install malware such as backdoor Trojans, information stealers and much more.
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
Smishing is a form of phishing that involves a text message or phone number. It's becoming an emerging and growing threat in the world of online security. Read on to find out what it is and how you can protect yourself against it.
Cybercriminals use sophisticated tactics to commit crimes. It takes a village to catch a cybercriminal since the method of how they commit these crimes is so complicated. Law enforcement usually has to coordinate with government agencies, international partners, and private corporations.
As more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks. Never download pirated ebooks and always buy books and digital content from legitimate retailers. Some ebooks may contain malicious software that can install malware, spyware, and viruses in your computer.
Want more?
Follow us for all the latest news, tips and updates.