Emerging Threats

31 articles

What 2024 holds for the future of cybersecurity
Norton’s researchers released their 2024 cybersecurity predictions. See how AI is predicted to impact the landscape of cybersecurity.
Published: December 12, 2023 ·8 min read
Deep web vs. dark web: What’s the difference?
What’s the difference between the deep web vs. the dark web? Get an overview of they work and tips on surfing the deep web and dark web.
Published: September 01, 2023 ·4 min read
April Consumer Cyber Safety Pulse Report
What you need to know about deepfakes, romance scams, and crypto scams. Plus, some of the latest phishing pages we have caught.
Published: May 09, 2022 ·3 min read
What is a Deepfake Anyway?
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Published: May 02, 2022 ·2 min read
Norton email scams: Answers to Your Frequently Asked Questions (FAQs)
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information.
Published: April 08, 2022 ·3 min read
Reopening, work, and COVID-19: 6 tips to help stay secure
As U.S. businesses start to reopen, employees and employer can team up to help keep company data safe
Published: December 01, 2021 ·2 min read
Reported 5 million credit cards breached at Saks, Lord & Taylor
Reported breach may affect 5 million debit and credit cards at Saks, Saks OFF 5TH and Lord & Taylor stores in North America.
Published: August 08, 2018 ·2 min read
Everything you need to know about a data breach
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Published: August 08, 2018 ·4 min read
Ticketmaster UK Breach: Customers’ Personal Data & Credit Card Information Possibly Stolen
Ticketmaster UK Breach: Customers’ Personal Data & Credit Card Information Possibly Stolen
Published: August 08, 2018 ·2 min read
What is an info-stealing ad library?
When it comes to free apps, there still may be a price, although it doesn’t always cost the user. There are other ways applications can earn revenue, such as running advertisements within the app itself.
Published: August 08, 2018 ·2 min read
Published: August 08, 2018 ·4 min read
Google+ exposed data of hundreds of thousands of users—here’s what you need to know
496,951 Google+ users’ full names, birth dates, gender, profile photos, addresses, occupation and relationship status were exposed.
Published: August 08, 2018 ·3 min read
Fight off malicious Pokemon GO apps with the help of Norton Mobile Security
Overnight sensation Pokémon GO! has continued to explode over a week after its New Zealand, Australia, and the US on Wed July 6. July 13th the game was released in Germany and the following day for the UK.
Published: August 08, 2018 ·4 min read
Yahoo announces data breach affecting 500 million users
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
Published: August 08, 2018 ·2 min read
Over half a million PCs infected as hackers go after cryptocurrency
What happens when cryptocurrency becomes one of the most desired forms of money? Everyone takes notice. That includes hackers.
Published: August 08, 2018 ·3 min read
Bank credential stealing Android malware is on the rise
Cyber criminals are finding new ways to steal your money through your Android device. Lately, the use of Android malware that steals your banking credentials, with names such as Acecard or GMbot, is on the rise.
Published: August 08, 2018 ·4 min read
NortonLifeLock discovery leads to malicious app that steals Viber photos and videos
Researchers at NortonLifeLock have recently discovered a malicious app that can steal photos and videos from the popular instant messaging and VoIP app Viber.
Published: August 08, 2018 ·2 min read
Dropbox has verified that 68 million user credentials have been exposed
Dropbox has announced via their blog that 68 million user email addresses with hashed and salted passwords have been exposed. Dropbox has verified that the information is indeed legitimate.
Published: August 08, 2018 ·4 min read
Targeted attacks now moving into the IoT and router space
Recently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
Published: August 08, 2018 ·3 min read
What is a dark web scan and can it protect your identity?
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
Published: August 08, 2018 ·4 min read
Working from home due to the coronavirus? Here are 7 tips to help protect your privacy online
Due to the coronavirus, many employers are having their employees to work from home. Learn tips to help keep your work devices secure.
Published: August 08, 2018 ·3 min read
What’s a Twitter bot and how to spot one
Twitter bots are automated Twitter accounts controlled by bot software. Learn what they do.
Published: August 08, 2018 ·2 min read
What is the dark web?
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
Published: August 08, 2018 ·2 min read
Cyberthreat trends: 15 cybersecurity threats for 2020
Expect to hear more about these emerging and existing cybersecurity threats and trends this year.
Published: August 08, 2018 ·2 min read
FaceApp goes viral and raises privacy worries: What you need to know
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
Published: August 08, 2018 ·4 min read
What you need to do about the WPA2 Wi-Fi network vulnerability
Until your Wi-Fi enabled devices have a security patch for the KRACK vulnerability here are some steps to take to help secure your devices.
Published: August 08, 2018 ·3 min read
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Published: August 08, 2018 ·2 min read
What is a firewall and do you need one?
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
Published: August 08, 2018 ·3 min read
Video conferencing risks when working at home: 16 ways to avoid them
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
Published: August 08, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.