Norton Blog

Online Scams

Editors picks

Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

August 08, 2018·3 min read
The importance of data back-up

Have you ever lost a lot of really important data? Or, alternately, have you ever had a moment of panic where you thought you did? Whether it's images of a family vacation, a report from work or a...

August 08, 2018·2 min read
What is a Deepfake Anyway?

If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.

May 02, 2022·2 min read

Try Norton 360 FREE 7-Day Trial*

7 days of FREE* comprehensive antivirus, device security, and online privacy.

Join today. Cancel anytime.

*Terms Apply

Start Free Trial

Most popular

What is an info-stealing ad library?

When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.

August 08, 2018·2 min read
How to choose antivirus software: What you need to know

With the threat landscape changing so rapidly, it is wise to understand what your antivirus software has to offer.

August 08, 2018·3 min read
How to get rid of spam emails

Spam. In some ways, it's the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it's also a pervasive problem that's clogging and overwhelming the Internet's email systems. Spam accounts for approximately 80 percent of worldwide email volume.

August 08, 2018·4 min read
What is a Trojan?

Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

August 08, 2018·4 min read

Most popular in Device Security

December 05, 2022·4 min read
August 08, 2018·3 min read

Most popular in Device Security

Want more?

Follow us for all the latest news, tips and updates.