Emerging Threats

14 articles

How to spot and remove a fake virus alert on your devices
Learn how to spot and remove a fake virus alert while keeping your devices safe from cybercriminals.
Updated: April 16, 2025 ·11 min read
Malware: What it is, how it works, and how to get rid of it
Learn what malware is, how to check for it, and how to protect against harmful threats.
Published: March 05, 2025 ·13 min read
What is Pegasus spyware and how to remove it?
Pegasus is smartphone spyware that surveils the mobile activity of criminals, but it's also been used against dissidents, journalists, and others.
Published: January 17, 2025 ·4 min, 24 sec
The new face of cyber threats—AI, deepfakes, and scams
Gen Threat Labs researchers reported that scammers have been exceedingly active, innovating new techniques and exploiting AI capabilities.
Published: October 22, 2024 ·6 min read
Going back to the ‘00s—Fake antivirus scams are back
Everything old is new again. Scammers are repurposing a popular ‘00s scheme, surprising many with its return.
Published: October 22, 2024 ·5 min read
AI for good — Using AI to help protect against scams
Learn how advanced technology can identify and block scams before they reach you.
Published: September 16, 2022 ·19 min read
What is a Deepfake Anyway?
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Published: May 02, 2022 ·2 min read
Everything you need to know about a data breach
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Published: August 08, 2018 ·4 min read
What is a dark web scan and can it protect your identity?
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
Published: August 08, 2018 ·4 min read
What is an info-stealing ad library?
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Published: August 08, 2018 ·2 min read
What’s a Twitter bot and how to spot one
Twitter bots are automated Twitter accounts controlled by bot software. Learn what they do.
Published: August 08, 2018 ·2 min read
Yahoo announces data breach affecting 500 million users
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Published: August 08, 2018 ·2 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published: August 08, 2018 ·2 min read
What is a firewall and do you need one?
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Published: August 08, 2018 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.