Norton UK Blog
A new strain of ransomware has appeared in multiple countries. On June 27, 2017, Petya ransomware emerged and began spreading itself to large organizations across Europe. This ransomware uses what is called the Eternal Blue exploit in Windows computers. It is not impacting individual users at the time of this writing.
Researchers have recently discovered more than 800 apps on the Google Play store that contain an information-stealing ad library dubbed Xavier. Google has been notified and has already removed a number of the apps containing the malicious ad library from the Google Play Store.
We all have secrets. Some we are ashamed to share and some we are afraid to share. Where does your password fit in? In practice, it should be a little bit of both. It is common sense to know the dangers and outcomes of sharing your passwords.
Phones break, tablets get stolen, laptops get taken over by viruses that corrupt files and computers just die a natural death. No matter how fancy or pricey your equipment is, there are some elements that are bound to overpower it. What have you lost? Data? Money? Memories? Is there a price tag you put on what was lost?
As a part of good cyber habits, make backing up an important part of your digital life. Here are a few top reasons why backing up your devices is one of the most important things one can do to live a safe digital life:
College can be one of the best experiences of your life, forging new skills through learning and personal connections while also enjoying a great social life. It is also a time for serious choices that will shape your future and starting with the right online protection is one of them to ensure there are no bumps in your career development.
Social media use has become synonymous with travel—people are constantly posting holiday snaps on Instagram, Facebook, Twitter and a multitude of other social platforms. As fun as it may be to let the world know the exciting experiences you’re having, it’s still important to consider the safety aspect of using social media no matter if you are home or abroad. Here’s our essential tips for safe social media use:
Millennials have grown up with the online world but are they more security conscious than their predecessors - Baby Boomers? Who shares their passwords without a worry and who is more likely to be the victim of cybercrime?
Find out more…
Nobody likes the thought of their digital life being held hostage for a large ransom...
When you think of a disaster, you probably imagine tornadoes, tsunamis, and earthquakes—environmental events that can devastate a community or continent. Digital disasters are a bit harder to imagine, and that’s because they’re not apparent among the tangible analog affected by similar disasters.
Digital disasters are characterized by less visible qualities, all of which disturb, damage, or delete the digitalized data, records, and information stored by an individual, company, or organization
Social media usually only appears in the news when it’s at its worst: when predators are poaching potential prey online; when people are threatened by violence; or when hate groups find a place to coordinate.
There was a time when Spam was just processed meat in can. Like it or love it was something you put on your dinner plate. Today, however, it’s come to mean something totally different—and its meaning seems to be changing all the time, as spam tactics and cyber threats get more sophisticated.
The notion of someone taking over your computer and watching you through your webcam may sound like something from James Bond but hackers are already using this technology. Spyware is a serious threat and victims are often unaware that they’re being spied on.
As the most popular travel days of the year approach, many holiday travelers are creating mental checklists for navigating busy airports on their journey home — most likely with their trusty mobile devices in hand and laptops in their bags. To save fliers the headache and heartbreak of having their devices compromised en route to Christmas with the family, here’s a handy checklist to keep smartphones, tablets, and laptops safe while spending time in an airport.
Your digital world can be a busy place but have you thought of how you’re connecting every day to your online life?
Most internet users have encountered spyware at some stage but few people actually know much about it...
The festive season is a time of merriment for one and all. That includes scammers, fraudsters, and thieves too who use this time of the year to do their worst.
You don’t have to be a super nerd to know how to protect yourself from cyber criminals and hackers. They might know more about computers and software than you do however, there are some basic defenses at your disposal to help you stand up against even the most sophisticated online threats.
Having a mobile device has become one of life’s essentials and when a loss or theft occurs it can be a sickening feeling, and often one that can be pretty stressful.
While many of us safeguard our desktops and laptops from a cavalcade of online threats, we’re much more lax about our phones. We download apps without a second thought or log into our bank accounts on public networks where just about anyone could be watching in.
One night of the year ghosts and goblins are free to haunt us. Malware and viruses, however, are free to terrorize us all year long. Here’s our…Five most frightful viruses terrorizing computer users everywhere.
Phishing can sometimes be dismissed as a less serious type of cybercrime but it can have devastating effects on people’s lives. How much damage could a scammer seriously do with some login details or some random personal information, you ask? Well, a lot as it turns out.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
When you invest in a new PC, mobile or tablet it can be a pretty exciting time. From engaging in online experiences to getting lost in toying with its advanced technical capabilities, a new device opens up a world of possibilities to be ever more connected online. But, with these new experiences, come new challenges to protect your identity and personal data. We’ve put together a handy guide to new device safety to help you get the most from your new tech.
Social media can be a wonderful place to stay connected with family, friends and to view the world going by. But, did you know every year millions of people fall victim to social media scams?
Have you ever wondered if it’s safe to use public Wi-Fi? It’s a question we should all ask ourselves as we more and more utilize free Wi-Fi connections.
A lot of money changes hands in the build up to the new school year. Because it’s a big time for businesses and every parent and student has an eye on bargains, it’s also a key time for scammers and criminals to try to find a way into your wallet. Here’s our advice to avoiding their latest tactics.
We all use search engines on a daily basis. It’s become routine in many of our lives. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds.
Parenting is a fast paced life. One minute it’s caring for the family nest to juggling the dawn scramble for p.e. kit , packing lunchboxes and dealing with tantrums at all hours of the day. We take on a multitude of professions offline over the course of our children’s lives - Taxi driver, chef even IT specialist, that some might think a parent has superhuman powers.
Two English strikers. Two top scorers in this season’s Premier League. A mobile back four and a proven goalkeeper. A twenty year old whiz kid at the base of midfield and a record breaking goal scorer at the helm, there have been rumblings, that this could be England’s year.
And with Euro 2016 fast approaching, many residents are scrambling for tickets to see their team do battle in France.
Phishing is when someone tries to get you to give them your private login information. That could be in the form of an instant message that asks, a phony online form made to look legitimate or, increasingly, a text or SMS message.
In the latter form this is known as “smishing.” Smishing is an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
Of the 7.4 Billion people that inhabit this planet, data compiled by Statista indicates that close to 2 Billion of us indulge in video games; there are now more gamers than the collective population of China and the U.S.
With the recent news that some of the UK’s major banking companies will be offering their customers the chance to use fingerprint or voice authentication to access their bank accounts biometrics are very much in the spotlight. So, what exactly are biometrics and how could they possibly be as secure as they seem?
You’ve heard of carjacking, and may recall Nicolas Cage’s performance in Con Air—an action-packed thriller about dangerous prisoners hijacking a plane. Now it’s time to familiarize yourself with Clickjacking, an Internet scam that’s out to steal your clicks.
According to recent UK Online Dating Statistics, 1 in 5 relationships in Great Britain now start online and with a study published by a leading matchmaking website suggesting that by 2031 that figure could well be 1 in 2 it is apparent that most of the stigma surrounding online dating has dissipated.
It’s official! Norton Security has won ‘Best Protection’ for home users in the 2015 AV-TEST Awards for its “high security performance protection without exception in all the certification tests”*.
We hear a lot in the news these days about companies and prominent individuals and celebrities being hacked. However, did you know that anyone with an online presence can potentially have their accounts or online profiles hacked? Do you know what steps you should take if you have discovered you've been hacked?
How do you create a strong password? It is vitally important that you secure your online accounts with strong passwords that are difficult for any would be cyber-criminal to guess or 'crack'.
Here is a handy infographic with some 'golden rules' for creating a strong password! Feel free to download (right click, and then 'save image'), or click on the icons above to share on social media.
Christmas and the holiday season is almost here, which means that many of us will be shopping online to avoid large crowds and the hustle and bustle on the streets and in the shops.
Introducing #30SecTech - a series of quick, bitesize educational videos on a range of topics including cybercrime, internet security, online privacy and more. Plus, we have a bonus! At the end of every video you will find a link to an article providing more background information on each topic. Enjoy!
Everywhere we go, we carry tiny computers in our pockets. We can answer any question within seconds using Google or we can live stream movies or hours of footage of the Kardashians from pretty much anywhere. There’s even Wi-Fi on Mount Everest.
Technology is everywhere and it’s easy to feel overwhelmed. iPads are standard practice for kids, and books—like analogue clocks—are a thing of the past. Many of our kids know how to navigate the web before they’ve figured out how to make their beds.
We’re not talking ancient Greek pottery here, but one of the most prevalent issues in Internet security today. But what exactly is grayware? Why is it a problem? And how should you deal with it? Read on to discover all you need to know about grayware.
So, what is grayware and what’s the big deal?
As its name might suggest, grayware is a category of software that sits in that ‘gray area’ – a sort of no-man’s land – between outright malware and legitimate conventional software.
We all love a good bargain, and the internet is a handy tool for comparing products and services and potentially making savings in both time and money. According to the Centre for Retail Research ecommerce is the most rapidly expanding retail market in Europe, and the British are the biggest-spending online shoppers: UK online sales grew by 15.8 per cent last year (2014), from £38.83bn in 2013 to £44.97bn.
However, there are a few pitfalls it pays to consider before starting your online shopping spree. Cybercriminals use a lot of different methods to exploit online payments, aiming to get hold of your personal data and lighten your wallet, or simply make money out of you by persuading you to click links. Follow our top tips for safer online shopping, and you’ll reduce the risks of paying out more than you intend when buying online.
With a growing amount of harmful and increasingly sophisticated software prowling the Internet, it’s essential to understand what spyware is and the problems it can cause. Spyware may be much more than an irritation as it can pose major privacy and security risks. Below, we’ll explain what spyware aims to do, how it gets into your computer and how you can avoid it.
Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party. Sometimes spyware asks for your consent first. More commonly, it installs itself on your computer without you knowing and runs in the background, secretly collecting data, sending you targeted adverts or meddling with your computer set-up.
Bullying – it’s an age-old problem. But it’s one that’s found a new lease of life on the Internet. Thanks to our ‘always on’ mobile technology and our enthusiasm for sharing everything without care, cyberbullying has found the perfect home online. Cyberbullies can hide behind the anonymity of the Internet, and reach their target easily at almost any time and from anywhere, while broadcasting to a potentially limitless audience.
As #BetaParents, we are the first generation of parents to raise children in the all-digital world; responsible for keeping them safe online.
Learn more about teaching your children healthy online habits with our free guide. CLICK HERE for the guide.
Of course, we’re talking about web cookies here – not the furry blue Sesame Street Muppet. Web cookies, unlike the treat-loving Cookie Monster, follow your movements on the Internet, collecting and storing information about you. No need to panic though: for the most part, cookies are intended to enhance and customise your browsing experience and are as harmless as the fluffy puppet.
However, because they can collect sensitive personal data, tracking cookies are sometimes considered to be a potential privacy concern. Continue reading to find out all about cookies: what they are, what they do and how you can manage them.
- blog (3)
- digital trends (34)
- family security (22)
- gaming and entertainment (10)
- how to guides (25)
- internet of things (9)
- mac tips (2)
- mobile insights (12)
- mobile safety (23)
- online safety (46)
- online safety tips (29)
- online security (53)
- online security tips (33)
- online threats (40)
- optimise your device (11)
- parental control software (6)
- social media (10)
No one can prevent all cybercrime or identity theft.
The Norton brand is part of NortonLifeLock Inc.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.