- Blog Home
- Malware
Malware
Related articles
24 articles
Find out about the mobile phone scam now spreading around the globe, infecting phones and stealing data
Antivirus software searches for known threats and monitors the behavior of all programs. It seeks to block or remove malware as quickly as possible. If you don’t have antivirus software installed, you could be at risk of picking up a virus.
Find out about the mobile phone scam now spreading around the globe, infecting phones and stealing data
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
Is my Android device infected by malware? How can I remove it? Here is some useful information that may help answer your questions.
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about…
A macro virus is defined as “a computer virus written in the same macro language used for software applications, such as word processors.”
What you need to know about Covid and Popular Shows scams, plus online tracking, and the 2021 year’s greatest hacks
IP spoofing allows cybercriminals to infect your computer with malware, steal your sensitive data, and crash your server, often without detection.
On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced (link is external) that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware.
Can a Mac get a virus? Yes, Apple’s computers can get viruses and malware just like PCs can.
You may have noticed growing reports in the media about the dangers of using USB memory sticks. It is true, they are susceptible to being exploited like everything else…
We’ve previously explained the different types of malware that are prevalent on the threat landscape, which begs the question: How does malware get onto my computer?
Grayware can affect your device’s performance and compromise your security online, as well as being a nuisance.
Product Features
Services & Support
Want more?
Follow us for all the latest news, tips and updates.