Learn about how antivirus works, its role in protecting your devices from viruses and malware, and more.
Published: ·
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: ·
Help protect your device against Trojan viruses. Learn effective ways and essential tips to defend against malware and other threats.
Published: ·
Is my Android device infected by malware? How can I remove it? Here is some useful information that may help answer your questions.
Published: ·
On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced (link is external) that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware.
Published: ·
If you have a virus on your iPhone, there are easy ways to get rid of it. Find out how to remove iPhone viruses here.
Published: ·
Learn how to remove malware and viruses from your device before they can expose sensitive information to hackers.
Published: ·
What should you do if a scammer has your email address? Find out if you have been hacked and how to safely protect your account.
Published: ·
Learn how keylogger attacks can affect you and how you can protect yourself and your device.
Published: ·
Learn whether your phone is hacked and what to do if it is. Here are the main signs to watch out for.
Published: ·
Different types of malware include trojans, worms, viruses, and many more. Learn about them here.
Published: ·
iOS viruses are extremely rare, but iPads are still vulnerable to other types of malware, along with online privacy and security threats.
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about…
The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.
Published: August 08, 2018 ·4 min read
Want more?
Follow us for all the latest news, tips and updates.
Want more?
Follow us for all the latest news, tips and updates.