Malware

Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: ·
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: ·
Zeus viruses live on your device and steal financial information — learn how to protect yourself.
Published: ·
Think your PC or Mac might be infected with a virus? Follow along and learn how to get rid of a virus in several easy steps.
Published: ·
Learn how to bypass Apple’s "Could not verify this app" alert and about risks to watch out for.
Published: ·
Is your phone acting suspiciously? Find out how to detect spyware on Android phones the easy way.
Published: ·
15 types of malware: real-world examples and protection tips
Learn about all the different types of malware, including spyware, adware, trojans, worms, viruses, ransomware, botnets, and more.
Updated: December 20, 2024 · 15 min read
Fake apps: What they are and how to spot them
Find out what fake apps are and how to protect yourself from them. Discover the types of fake apps, how to spot one, and what to do if you've downloaded one.
Published: September 30, 2024 · 10 min read
How to check for viruses on iPhone: A detection guide
Think your iPhone has a virus but don't know how to check? Follow this detection guide to learn how to check for viruses on iPhone.
Published: May 22, 2024 · 7 min read
What is a zip bomb and how does it work?
Zip bombs look deceptively small but can expand to a massive size and overload your device. Learn how.
Published: April 02, 2024 · 6 min read
Lateral movement attacks: What they are and why you should care
Hard to detect and harder to contain, lateral movement attacks start with a single device, then spread infection across a network. Here’s what you need to know about them.
Published: March 11, 2024 · 7 min read
Computer viruses: How they spread and tips to avoid them
What is a computer virus? Learn how computer viruses spread, how to spot them, and tips to keep them at bay.
Updated: February 29, 2024 · 6 min read
What are browser hijackers? Removal + prevention tips
Browser hijackers are a form of software that alters your internet experience. Follow this guide to learn more about browser hijackers and how to remove them.
Updated: February 20, 2024 · 7 min
What is a remote access Trojan? A cybersecurity guide
Remote access Trojans trick you into giving hackers complete control of your device. Learn how RATs work and how to prevent attacks.
Published: February 18, 2024 · 10 min
How to know if your computer has a virus: 9 warning signs
Think your computer is infected? Learn how to know if your computer has a virus, the signs to look out for, and how to respond.
Updated: February 18, 2024 · 9 min
Are you accidentally pirating software?
Software piracy isn’t always malicious. In fact, it’s surprisingly easy to do it accidentally. Here’s how to make sure you aren't doing it.
Published: January 31, 2024 · 4 min read
How to detect spyware and remove it
Find out how to detect spyware and safeguard your online activities. Learn to recognize spyware on Android, iOS, and computers, plus tips for how to get rid of it.
Published: January 02, 2024 · 18 min
6 common types of ransomware you need to know about in 2024
There are currently six common types of ransomware, and they collectively contribute to millions of cybersecurity attacks globally each year. Learn more.
Published: December 15, 2023 · 16 min
Malware: what it is, how it works, and how to stop it
Learn what malware is, how to check for it, and how to protect against harmful threats.
Published: December 08, 2023 · 13 min
What is antivirus? Definition, types, and benefits
Learn more about antivirus software, including how it works, the different types available, and its role in protecting your devices from viruses and malware.
Published: November 28, 2023 · 8 min
Can Macs get viruses? Yes. Here's how to protect yours
Can Macs get viruses? Follow this guide to learn how to keep your Mac safe from viruses, malware, and other threats that could harm your device.
Published: November 04, 2023 · 10 min
Can iPads get viruses? An iPad cybersecurity guide
iOS viruses are extremely rare, but iPads are still vulnerable to other types of malware, along with online privacy and security threats.
Published: November 03, 2023 · 13 min
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Published: October 25, 2023 · 9 minutes
Is your computer haunted? No, it’s probably malware
Your computer isn’t haunted—it’s probably malware. Check out the signs of infection, and how to protect yourself from these digital ghosts.
Published: October 06, 2023 · 3 min read
What is Pegasus spyware + how to remove it from your mobile device?
Pegasus spyware is one of the most sophisticated digital surveillance tools out there. Learn what it is and how it works.
Published: October 06, 2023 · 4 min
What is scareware + how to remove it
Scareware is invasive software that tries to frighten users into performing specific actions. Learn how to detect and remove these programs from your devices.
Published: September 06, 2023 · 7 min read
What is a botnet?
A botnet is a string of connected computers coordinated together to perform a task. Learn how they work and how you can help protect yourself.
Published: September 01, 2023 · 4 min read
What to do if you're a victim of malware
Trojan horses, bots, adware, ransomware, macro viruses, rogueware, spyware, worms and phishing attacks target Internet users every day. The more we use the Internet, the more vulnerable we are to threats. There are many security measures that Internet users can put in place to minimize putting themselves at risk from malicious attacks.
Published: September 01, 2023 · 4 min read
Adware: How to remove this invasive software
Adware is an invasive malware that floods users with advertisements. Learn how adware can infect your devices—and how to remove it.
Published: August 22, 2023 · 5 min read
What is a rootkit? Detection + prevention tips
A rootkit is malware that grants attackers access to a device while remaining undetected. Follow his guide to learn how to detect and guard against rootkit attacks.
Published: July 21, 2023 · 4 min read
Spyware: What it is and how to protect yourself
Spyware is malicious software that secretly monitors and steals your data. Learn how to protect against it.
Published: July 20, 2023 · 3 min read
What is a keylogger? A total protection guide
Not sure what a keylogger is? Find out how a keylogger attack could affect you and how you can protect yourself and your device.
Published: July 19, 2023 · 4 min read
Can iPhones get viruses? Yes, here’s what to do
iPhones are unlikely to get viruses, but it’s possible—especially if your phone is jailbroken. Learn more.
Published: July 17, 2023 · 3 min read
Is my phone hacked? 5 signs + protection tips
Signs of phone hacking include high data usage, pop-ups, and unfamiliar apps. Learn more ways to determine if your phone is hacked.
Published: July 13, 2023 · 2 min read
How to remove a virus from an Android phone
Learn how to remove a virus from your Android easily with these six simple steps to secure your device.
Published: June 14, 2023 · 2 min read
How to remove malware from a Mac or PC
Learn how to remove malware from your device before it can expose sensitive information to hackers.
Published: March 17, 2023 · 3 min read
What is riskware + how to spot and avoid it in 2024
Riskware refers to legitimate software that can potentially threaten your cybersecurity. Read our guide to learn how to spot and avoid riskware.
Published: March 15, 2023 · 5 min read
19 signs of malware + how to cure the symptoms
Is your device acting weird? If so, it may be malware. Follow this guide to learn about the signs of malware and how to diagnose and treat a malware infection.
Published: November 22, 2022 · 2 min read
What is CryptoLocker? An overview + prevention tips
CryptoLocker is ransomware that encrypts your files and requests payment to decrypt them. To learn more about CryptoLocker and how it works, follow this guide.
Published: October 12, 2022 · 3 min read
How to remove a fake virus alert: A step-by-step guide
Learn how to remove a fake virus alert, spot the warning signs, and keep your devices safe.
Published: August 31, 2022 · 3 min read
How to avoid ransomware: 9-step guide
Trying to avoid ransomware? Use this nine-step guide to learn how to better avoid ransomware threats online.
Published: August 16, 2022 · 4 min read
Ransomware statistics: 102 facts and trends you need to know
Dig into 50+ surprising ransomware statistics to learn more about one of this year’s biggest cybersecurity threats.
Published: August 08, 2022 · 4 min read
What is a fake antivirus software? An overview of rogue security software
What is fake antivirus software? Follow this guide to learn more and discover helpful tips on how to spot and avoid fake antivirus scams online.
Published: July 01, 2022 · 4 min read
What are drive-by downloads + drive-by attack prevention tips
What are drive-by downloads? Use this complete guide on drive-by attacks to help protect your data from drive-by hacking and other dangerous online threats.
Published: February 14, 2022 · 4 min read
Shareware: An overview + the cost of ‘free’ software
Learn about shareware, including what it is, how it works, different types, and what risks you need to protect yourself from in our guide.
Published: February 07, 2022 · 4 min read
What is ransomware and how to help prevent ransomware attacks
Ransomware is a form of malicious software that locks and encrypts a victim’s computer or device data, then demands a ransom to restore access. In many cases, the victim must pay the cybercriminal within a set amount of time or risk losing access forever. If the attackers don’t give you the decryption key, you may be unable to regain access to your data or device.
Published: November 23, 2021 · 3 min read
What is a heuristic virus and how do I remove it?
Heuristic virus can refer to malware detected by heuristic analysis or the virus Heur.Invader, which compromises a device’s security and antivirus measures.
Published: September 17, 2021 · 4 min read
What small business owners need to know about ransomware attacks
You're never too small to be the target of a ransomware attack. Learn tips for small business owners.
Published: August 06, 2021 · 3 min read
What is a Trojan? Is it a virus or is it malware?
Trojans are malicious programs that disguise themselves as legitimate files. Learn different types and how to detect them.
Published: July 23, 2020 · 4 min read
What is a computer worm, and how does it work?
Computer worms are a dangerous type of self-replicating malware. Here’s a guide to how they work and how to defend against them.
Published: August 28, 2019 · 2 min read
Malware attacks: What you need to know
Malware is software that cyber attackers develop to gain access or cause damage to a computer or network, usually without the victim’s knowledge. Different types of malware include viruses, spyware, ransomware, and Trojan horses. Malware attacks can occur on all sorts of devices and operating systems, including Microsoft Windows, macOS, Android, and iOS.
Published: July 17, 2019 · 3 min read
Everything you need to know about macro viruses
A macro virus is written in the same language used by Excel, Word, and similar programs. Learn how macro viruses work and how to spot them.
Published: October 29, 2018 · 4 min read
Malvertising: What is it and how to avoid it
Malvertising is the combination of malware and advertising. Find out how to prevent it and stay safe online.
Published: August 08, 2018 · 2 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published: August 08, 2018 · 3 min read
Virus FAQ
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: August 08, 2018 · 3 min read
What is fileless malware and how does it work?
Fileless malware uses your system’s software, applications and protocols to install and execute malicious activities. Learn more.
Published: August 08, 2018 · 4 min read
What is a Trojan downloader?
A Trojan downloader is a type of Trojan horse that downloads and installs files, often malicious programs.
Published: August 08, 2018 · 2 min read
What is a PUA (Potentially Unwanted Application) or PUP (Potentially Unwanted Program)?
Potentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package.
Published: August 08, 2018 · 2 min read
Avoiding ransomware scams on social media
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
Published: August 08, 2018 · 2 min read
What is mobile ransomware?
Mobile ransomware is a form of malware that steals sensitive data or locks a device and then demands payment before returning the data or unlocking the device.
Published: August 08, 2018 · 4 min read
How do firewalls prevent computer viruses?
Firewalls function as a critical line of defense against cybercriminals. Know what they protect and how they work.
Published: August 08, 2018 · 4 min read
6 tips to avoid getting a virus on your devices from the internet
How do you avoid getting a virus on your devices from the internet? Here’s our tips to help keep you protected.
Published: August 08, 2018 · 3 min read
Mazar BOT malware invades and erases Android devices
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
Published: August 08, 2018 · 4 min read
Bug in Apple’s iOS and OSX AirDrop could allow malware to be installed silently
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
Published: August 08, 2018 · 4 min read

Want more?

Follow us for all the latest news, tips, and updates.