What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Explore topics
30 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
Having more than Antivirus protection is essential. Learn why.
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
Clone phishing is a technique that scammers use to steal your information. Our guide describes how it works, gives examples, and teaches you how to prevent it.
Electronic signature service DocuSign has warned consumers about new phishing campaigns. Here’s help in avoiding scams.
Tips on how to report a scam website.
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
Data breaches at companies can affect millions of consumers, but what does that mean for you? We explain it all.
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
To give you piece of mind while online shopping during the Holiday season here are four simple things you can do to protect yourself.
Having a productive and safe online digital life is important for you and your family to get the most from online experiences. We list some of the ways you can protect your private information online.
What are cookies and how do you clear cookies on your computer?
Tech support scams can be executed via cold calls, pop-up messages, and incorrect search engine results. Learn more.
Want more?
Follow us for all the latest news, tips and updates.