Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
Researchers at NortonLifeLock have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber.
What happens when cryptocurrency becomes one of the most desired forms of money? Everyone takes notice. That includes hackers.
Are your Apple AirPorts suddenly flashing yellow? That’s because Apple has sent out a major update to your AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
As U.S. businesses start to reopen, employees and employer can team up to help keep company data safe
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Due to the coronavirus, many employers are having their employees to work from home. Learn tips to help keep your work devices secure.
It may take some time for the manufacturer of your devices to come up with a security patch for this. In the meantime, there are extra steps you can take to help secure your devices.
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Twitter bots are automated Twitter accounts controlled by bot software. Learn what they do.
Recently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
Although Dridex (W32.Cridex) and Locky (Trojan.Cryptolocker.AF) have been unusually quiet, a new type of ransomware may be taking their place on the online threat landscape.
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
What you need to know about deepfakes, romance scams, and crypto scams. Plus, some of the latest phishing pages we have caught.
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.
496,951 Google+ users’ full names, birth dates, gender, profile photos, addresses, occupation and relationship status were exposed.
Ticketmaster UK Breach: Customers’ Personal Data & Credit Card Information Possibly Stolen
Services & Support
Follow us for all the latest news, tips and updates.