Protect yourself against online scams

Download Norton 360 Deluxe to help block unsafe links and protect against online scams.

Protect against online scams

Install Norton 360 Deluxe to help block unsafe links and protect against online scams.

Norton 360 Deluxe

Protect against online scams

Install Norton 360 Deluxe to help block unsafe links and protect against online scams.

Norton

360 Deluxe

Who's this for?

Answer 3 quick questions to get matched with the best protection. Firstly, choose who or what you need to cover below.

What are you most concerned about?

We'll suggest the best coverage for your concerns. Select all that apply.

How many devices do you need to protect?

For the best protection, cover every device you use online.

Creating your recommendation

norton:productquiz:iconturninggears
Did you know?
Norton technology blocks millions of cyberthreats every day.
Trusted by millions of customers around the globe.
Norton™ Mobile Security
Standard
£ 29.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • Protection for 1 iPhone® or iPad®
  • Scam Protection
  • Wi-Fi Security
  • Internet Security
  • Device Security
Norton AntiVirus
Plus
£ 34.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PC, Mac, tablet, or phone
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 2 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
Norton 360
Standard
£ 24.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 1 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 10 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
Norton Identity Advisor
Plus
£ 19.99/per yr

Payment method required.
When trial ends, paid subscription starts and automatically renews at {ar}/year, unless the renewal is cancelled. Price is subject to change. Subscription details below.*

  • Financial Monitoring​
  • Credit Report and Score​18
  • Credit Alerts​18
  • Identity Restoration Support
  • Social Media Monitoring17
  • Dark Web Monitoring​§
Norton 360
Deluxe
£ 89.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Scam Protection
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 50 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
Norton VPN
Standard
£ 59.99first yr

Automatically renews at {ar}/year, unless the renewal is cancelled. Price is subject to change.
Subscription details below.*

  • IP masking to hide your online activities
  • Access your favourite content across borders
  • Ad Blocker to browse without annoying ads14
  • No-log policy to ensure your privacy
  • Kill Switch to help prevent privacy exposure
  • IP Rotation and Double VPN for extra privacy
  • AI-powered protection against scams, phishing, and malware. 
  • Monitoring for your info on the dark web§
  • Password Manager to use strong passwords
  • 10 GB of Cloud Backup4 for valuable files
Norton
Small Business Premium
£ 219.99/first yr (Up to 5 employees)

Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Alerts on suspicious transactions on your company's bank accounts.
  • Social Media Monitoring to help you prevent admin account takeover.17
  • Business Tech Support on call 24/7, ready to assist with common tech issues and virus removal.
  • Secure VPN for a safer internet connection wherever work takes you.
  • 500 GB secure Cloud Backup for your business-critical data.21
  • Driver Updater for enhanced security and more reliable PC performance.21
Norton 360
Advanced
£ 149.99first yr

Automatically renews at
{ar}/year, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 10 PCs, Macs, tablets, or phones
  • Scam Protection Pro
  • Antivirus, malware, ransomware, and hacking protection
  • 100% Virus Protection Promise2
  • 200 GB Cloud Backup‡‡,4
  • Password Manager
  • Deepfake Protection23,33
  • VPN private connection
  • Parental Control
  • Dark Web Monitoring§
  • Identity Restoration Support
  • Credit Report and Score18
  • Credit Alerts18
  • Stolen Wallet Assist
  • Social Media Monitoring17
  • Financial Monitoring
Norton
Small Business
£ 129.99/first yr

 Automatically renews at {ar}/year, unless the renewal is cancelled.
Price is subject to change.
See subscription details below.*

  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21
Norton
Small Business
£ 74.99/year

Automatically renews, unless the renewal is cancelled.
Price is subject to change.
Subscription details below.*

  • 5 PCs, Macs, tablets, or phones
  • Always-on cyber protection for your business devices.
  • Secure browser to work, browse, and bank safer online.22
  • Encrypted vault for your passwords and corporate credit cards.
  • Automatic Software Updater to close security risks and holes.21
  • Windows PC cleaner and optimizer to support your employees' productivity with well-maintained PCs.21
  • Monitoring for exposed employee identities on the dark web (5 contacts).§
  • 250 GB secure Cloud Backup for your business-critical data.21

Your personalized matches

norton:productquiz:iconshieldnumber60
60-day money-back guarantee
  • Best choice

  • Better choice

  • Good choice

*Important subscription, pricing, and offer details:

  • By subscribing, you are purchasing a recurring subscription which will automatically renew.
  • The price quoted today is valid for the offered introductory term. After that, your subscription will be billed at the applicable monthly or annual renewal price here. The price is subject to change, but we will always send you a notification email in advance.

2 Requires an automatically renewing subscription for a product containing antivirus features. For further terms and conditions, please see norton.com/virus-protection-promise.
4 Only available on Windows systems (but not in S mode or on ARM processors).
21 Utilities Ultimate, Driver Updater, Software Updater, and Cloud Backup features are only available on Windows (excluding Windows in S mode and Windows running on ARM processor).
22 Private Browser is only available on Windows (excluding Windows in S mode and Windows running on ARM processor) and Mac.
Monitoring available on Windows™ PC, iOS, and Android™ devices. Not all features available on all platforms.
§ Monitoring not available in all countries and varies based on region.

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

norton:productquiz:iconquestionmarkspeechbubble

What is social engineering and how not to fall for it

Most cybercriminals are master manipulators, but that doesn’t mean they’re all manipulators of technology — some favour the art of human manipulation instead. Learn how different examples of social engineering work and the techniques to watch for. Then, install a trusted cybersecurity tool that can help you spot cyberattacks launched by social engineers and help you keep your personal data private.

AV Comparatives award

2025

Approved

Anti-Phishing

av test award

2025

Top Rated Product

A man looking in the mirror as an example of social engineering, a malicious tactic used to gain access to confidential information.

Social engineering definition

Social engineering in cybersecurity is the practice of manipulating someone into giving up sensitive information, usually through exploiting human error or taking advantage of trust in digital communications.

How social engineering works

Social engineering works by building false trust, exploiting human error, and using persuasion to gain access to sensitive or confidential information. As with most cyber threats, social engineering schemes can come in many forms, but they all generally work the same way.

There are four basic steps to a successful social engineering attack:

  1. Preparation: The social engineer gathers information about their victims, including where to contact them, such as on social media, email, text-messaging platforms, etc.
  2. Infiltration: The social engineer contacts their victims, often by impersonating a trustworthy source and using the information gathered about their victims to gain trust.
  3. Exploitation: The social engineer uses persuasion to request information from their victims, such as contact information or even login details that they can use for fraudulent purposes.
  4. Disengagement: After carrying out their attack, the social engineer abruptly breaks off communication with their victims.

Depending on the social engineering attack type, these steps could span a matter of hours to months. But no matter the time frame, knowing the signs of a social engineering attack can help you stop it.

Social engineering attacks can often happen through text messages.
An example of a social engineering attack happening through a text message.
Social engineering attacks can often happen through text messages.
An example of a social engineering attack happening through a text message.

How to spot a social engineering attack

If you receive a message from a stranger that feels random, too personal, or too good to be true it’s likely the beginning of a social engineering attack. Unlike traditional cyberattacks where cybercriminals like to remain unnoticed, social engineers often communicate directly with their victims in plain sight.

Here are some common social engineering techniques to watch out for:

  • Strange messages: Social engineers can pose as trusted individuals, including a friend, colleague, or even a bank. But you know your friends best, so if someone sends something out of the ordinary, ask them about it. Just use a different form of communication in case they were spoofed.
  • Emotional manipulation: Social engineers are great at stirring up specific emotions like fear, curiosity, or pity, so consider the cause of these emotional triggers before acting on them. If a complete stranger messages you with a sob story, it’s likely a social engineering technique.
  • Urgent requests: Social engineers don’t want you to think twice. That’s why many social engineering attacks involve some type of urgency, such as a lottery you need to enter immediately or cybersecurity software you need to download to wipe a supposed virus off your computer.
  • Offers that feel too good to be true: It's tempting to want to cash in on winning the lottery or go on a free cruise. But chances are that if the offer seems too good to be true, it is — it's probably a social engineering attack.
  • Unsolicited help: Social engineers might reach out pretending to be from a company providing help for a problem you don't have, like in a tech support scam. Don’t be fooled into granting unsolicited remote access to your computer.
  • False or unproven identity: If you raise any suspicions with a potential social engineer and they’re unable to prove their identity — perhaps they won’t do a video call with you, for instance — chances are they’re lying about who they are and what they want.
An illustrated list of common signs of a social engineering attack.
An illustrated list of common signs of a social engineering attack.
An illustrated list of common signs of a social engineering attack.

8 types of social engineering attacks + examples

Almost all cyberattacks have some form of social engineering involved. And many social engineering techniques also involve malware — malicious software that wreaks havoc on devices and potentially monitors your activity.

Here are some common forms of social engineering and examples, from in-person manipulation to annoying spam texts:

1. Scareware

As the name indicates, scareware is malware that aims to scare you into doing something fast. It often comes in the form of pop-ups or emails imploring you to act immediately to get rid of supposed viruses or malware on your device. In fact, if you act you might be downloading a computer virus or malware.

Scareware example — Imagine you’re scrolling through your phone when you receive a message purporting to be from a popular messaging app telling you that the software version you’re using is outdated and warning you against the dangers of not keeping your apps up to date. So, you click the provided link. But instead of the app being updated, your device is infected with malware.

2. Email hacking and contact spamming

It’s in our nature to pay attention to messages from people we know. And social engineers know this all too well, commandeering email accounts and spamming contact lists with all types of social engineering threats.

Email hacking and contact spamming example — Your friend sends you an email with the subject, “Check out this site!” and you don't think twice before opening it. By hacking an email account, a social engineer can make contacts believe they’re receiving emails from someone they know. Usually, the purpose is to spread malware or trick people into exposing their personal data.

Email hacking and contact spamming example.
Email hacking and contact spamming example.
Email hacking and contact spamming example.

3. Phishing

Phishing is one of the most common types of social engineering, and typically involves a cybercriminal sending an email or text message asking for private information or encouraging you to click on an infected link. Different types of phishing scams are commonly used together, or in tandem with other social engineering schemes, to create more sophisticated social engineering attacks.

Phishing scams also come in a few different delivery forms:

  • Email phishing is one of the most traditional phishing methods and is often spam sent to many people at once.
  • Vishing (voice phishing) is when a phisher calls or leaves a voicemail pretending to be from a trusted institution in hopes of gaining private information.
  • Smishing (SMS phishing) involves sending texts containing malicious links or probing for personal information.
  • URL phishing is when a phisher sends a link to a fake website that looks legitimate to the victim. When the victim clicks the link, they’re asked to provide private details that can be harvested by the attacker.
  • In-session phishing occurs when a victim is actively signed into an account or platform and a fake pop-up appears asking them to sign in again or to provide other sensitive information. It usually occurs on sites that don’t use https encryption.

Phishing example — Imagine you work for a big company, and you receive an email that appears to be from IT. The email asks you to change your login password immediately, but when you click the link provided, you’re redirected to a fake site that collects your new login information.

An example email that uses phishing to achieve a social engineering attack.
An example email that uses phishing to achieve a social engineering attack.
An example email that uses phishing to achieve a social engineering attack.

4. DNS spoofing

Also known as cache poisoning, DNS spoofing is when a browser is manipulated so that website visitors are redirected to malicious websites bent on stealing sensitive information. DNS spoofing is when your cache is poisoned with these malicious redirects.

DNS spoofing example — A cybercriminal creates a convincing copycat site of an online marketplace. When users go to log in, they are rerouted to the fake site and enter their login details. By doing so, they’ve unwittingly shared their password and username with the cybercriminal.

5. Baiting

Baiting is a social engineering technique that involves dangling something desirable in front of a victim, and hoping they’ll take the bait — like rare access to a confidential file. This occurs most often on peer-to-peer sites like social media, whereby someone might encourage you to download a video or music, but it’s actually malware.

Baiting example — A social engineer leaves a USB stick that’s loaded with malware in a public place. The USB is likely labelled in a compelling way — like “confidential” or “bonuses.” A target picks up the device and plugs it into a computer to see what’s on it, which loads the malware onto the device.

6. Pretexting

Pretexting is the use of an interesting pretext, or ploy, to capture someone’s attention. Once the story hooks the person, the social engineer tries to trick the would-be victim into providing something of value. Oftentimes, the social engineer is impersonating a legitimate source.

Pretexting example — Let’s say you receive an email naming you as the beneficiary of a will. The email requests your personal information to prove you’re the actual beneficiary and to speed up the transfer of your inheritance. Instead, you’re at risk of giving a con artist the ability to access and withdraw your funds.

An example of a pretexting attack dangling a supposed tax refund.
An example of a pretexting attack dangling a supposed tax refund.
An example of a pretexting attack dangling a supposed tax refund.

7. Watering hole attacks

A watering hole attack is a social engineering attack that infects a single website with malware. The site is almost always a very popular one — a virtual watering hole, if you will — to ensure that the malware can reach as many victims as possible.

Watering hole attack example — In 2017, the Polish Financial Supervision Authority was the victim of a watering hole attack. In this social engineering attack, users from specific IP regions who visited the site were redirected to a custom exploit kit, which then installed malware onto the visitors’ devices.

8. Quid pro quo

Quid pro quo means a favour for a favour, essentially “I give you this, and you give me that.” In this type of social engineering attack, the victim coughs up sensitive information, like account logins or financial details, then the social engineer doesn’t return their end of the bargain.

Quid pro quo example — Imagine you’re on a gaming forum and on the lookout for a cheat code to pass a difficult level. You transfer money to someone selling the code, but you never hear from them again and you don’t get your code — you’ve fallen victim to a quid pro quo social engineering attack.

An illustration of 10 social engineering attack examples.
An illustration of 10 social engineering attack examples.
An illustration of 10 social engineering attack examples.

How to protect against social engineering attacks: 15 tips

  1. Avoid suspicious links and attachments.
    Don’t click links or open attachments that you aren’t expecting — they could be infected with malware or lead you to malicious websites.
  2. Don’t overshare online.
    Social engineers know just what to look for when researching their victims. Protecting your privacy online is the first step to avoiding social engineering attacks.
  3. Use caution in online-only friendships.
    If an online friend is asking you for favours and personal information, but they’re unwilling to verify their identity — be cautious. It might be a social engineer.
  4. Learn how to spot social engineering methods.
    Remember the signs of social engineering and the different ways social engineering attacks can affect you.
  5. Be sceptical.
    If a promise, offer, or deal seems too good to be true, it probably is. Grandiose promises are a common method of social engineering.
  6. Use two-factor authentication (2FA).
    Enabling 2FA on your online accounts can help keep your online data private and out of the hands of social engineers.
  7. Practice good password hygiene.
    Create strong, unique passwords and change them periodically. Never use the same password twice, and don’t use common phrases or personal information.
  8. Use a password manager.
    Consider using a secure password manager to create hard-to-crack passwords and keep track of them all in one place.
  9. Set strict spam filters.
    Enable email and text spam filters to catch potential phishing messages. Social engineers love using spam messages to trick many victims at once.
  10. Keep your Wi-Fi network private.
    Don’t allow strangers to access your Wi-Fi network — you don’t know what they could be up to and what information they’re collecting.
  11. Connect to a VPN.
    Use a VPN (virtual private network) when connecting to Wi-Fi, because encrypted data is private data, and can potentially save you from social engineering attacks.
  12. Monitor your account activity closely.
    If you notice unusual charges on your accounts, odd emails sent from your address, or other strange activity, change your passwords immediately.
  13. Don’t leave devices unattended.
    Apart from avoiding theft, keeping track of your device helps you protect private data stored on your devices, such as account logins. And it also helps prevent physical breaches, like having a keylogger installed without your knowledge.
  14. Keep your software up to date.
    Using the best and most secure software on the market doesn’t mean much unless you keep it up to date to avoid security vulnerabilities that hackers love to exploit.
  15. Use cybersecurity software.
    When social engineering attacks happen, cybersecurity software can help protect you from falling victim to cyberattacks.

Manipulation is an unpleasant tactic for someone to get what they want. Thankfully, social engineering attacks can be thwarted if you know how to spot the signs. But knowledge isn’t the only way to protect yourself against social engineering attacks. Norton 360 Deluxe is an all-in-one cybersecurity solution that can help protect your devices, your data, and yourself from falling victim.

Ellie Farrier
Ellie Farrier is a staff editor at Norton, where she writes on a wide range of topics, with a focus on how technology and society overlap.

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 


Want more?

Follow us for all the latest news, tips, and updates.