Norton UK Blog
A new strain of ransomware has appeared in multiple countries. On June 27, 2017, Petya ransomware emerged and began spreading itself to large organizations across Europe. This ransomware uses what is called the Eternal Blue exploit in Windows computers. It is not impacting individual users at the time of this writing.
Researchers have recently discovered more than 800 apps on the Google Play store that contain an information-stealing ad library dubbed Xavier. Google has been notified and has already removed a number of the apps containing the malicious ad library from the Google Play Store.
We all have secrets. Some we are ashamed to share and some we are afraid to share. Where does your password fit in? In practice, it should be a little bit of both. It is common sense to know the dangers and outcomes of sharing your passwords.
Travel used to be about getting away from it all — your phone, mail, work. Now mobile devices and public Wi-Fi keep us connected while we’re away from home. But that doesn’t mean it’s safe to use public Wi-Fi hotspots during your trip. In fact, using unsecured free public Wi-Fi anywhere is extremely dangerous to your information and your identity.
Phones break, tablets get stolen, laptops get taken over by viruses that corrupt files and computers just die a natural death. No matter how fancy or pricey your equipment is, there are some elements that are bound to overpower it. What have you lost? Data? Money? Memories? Is there a price tag you put on what was lost?
As a part of good cyber habits, make backing up an important part of your digital life. Here are a few top reasons why backing up your devices is one of the most important things one can do to live a safe digital life:
Student life is one of the defining events in our lives. No matter if studying at home or abroad it’s a time to experience life changing moments navigating new waters filled with hectic college schedules. We form new relationships and make a whole lot of serious decisions both in the real and digital world that will shape our future careers.
College can be one of the best experiences of your life, forging new skills through learning and personal connections while also enjoying a great social life. It is also a time for serious choices that will shape your future and starting with the right online protection is one of them to ensure there are no bumps in your career development.
Millennials have grown up with the online world but are they more security conscious than their predecessors - Baby Boomers? Who shares their passwords without a worry and who is more likely to be the victim of cybercrime?
Find out more…
Nobody likes the thought of their digital life being held hostage for a large ransom...
There was a time when Spam was just processed meat in can. Like it or love it was something you put on your dinner plate. Today, however, it’s come to mean something totally different—and its meaning seems to be changing all the time, as spam tactics and cyber threats get more sophisticated.
The notion of someone taking over your computer and watching you through your webcam may sound like something from James Bond but hackers are already using this technology. Spyware is a serious threat and victims are often unaware that they’re being spied on.
If your planning on treating yourself to a new piece of tech or expecting a little surprise present this season remember not only should you protect your new toy but also prepare your old one for its new home. There are many ways to dispose of old tech, whether it’s donating your old phone to charity or handing down a retired laptop so once you’re ready to shift your digital life to a new device , you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled.
Our world is hyper-connected, with social media, smart tech, wearables, and apps meaning we’re constantly online. But it’s only going to get more advanced as we move further towards to the Internet of Things.
Christmas is a time for re-connecting with friends and loved one’s. Why not make your online moments even more secure this year with our gift to you – Our 12 days of Norton security tips...
Most internet users have encountered spyware at some stage but few people actually know much about it...
The festive season is a time of merriment for one and all. That includes scammers, fraudsters, and thieves too who use this time of the year to do their worst.
You don’t have to be a super nerd to know how to protect yourself from cyber criminals and hackers. They might know more about computers and software than you do however, there are some basic defenses at your disposal to help you stand up against even the most sophisticated online threats.
One night of the year ghosts and goblins are free to haunt us. Malware and viruses, however, are free to terrorize us all year long. Here’s our…Five most frightful viruses terrorizing computer users everywhere.
We love being connected in the digital world. Whether it’s our smartphone, tablet or Pc device it is hard to imagine a world without them. From online shopping, to gaming to sharing moments with our connections we use the online world in ways that have not gone unnoticed.
Did you know Smartphones and tablets are an increasingly attractive target for online criminals?
Phishing can sometimes be dismissed as a less serious type of cybercrime but it can have devastating effects on people’s lives. How much damage could a scammer seriously do with some login details or some random personal information, you ask? Well, a lot as it turns out.
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks to the personal information available on our laptops and smartphones. Here is a helpful list of dos and don’ts you should follow if you plan to use public Wi-Fi.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
For all intents and purposes your smartphone is a convenient amalgam of computer, diary, bank account and television. You eat with it, email with it, play with it, and on the odd occasion, even make phone calls with it. It’s your favourite recipe book, your cherished photo album, your financial vault, and you should be treating it with the utmost care and attention.
Have you ever wondered if it’s safe to use public Wi-Fi? It’s a question we should all ask ourselves as we more and more utilize free Wi-Fi connections.
The internet is a wonderful resource that’s full of information, entertainment and funny cat pictures but it can also be a dark place if you stray off the path or run into digital criminals. Unfortunately, anywhere that attracts lots of people will inevitably attract criminals who see these users as potential victims.
We all use search engines on a daily basis. It’s become routine in many of our lives. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds.
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?
Instagram accounts are being hacked and used to lure other users to adult “dating” websites, while earning money for the scammers. Read how to protect yourself.
Two English strikers. Two top scorers in this season’s Premier League. A mobile back four and a proven goalkeeper. A twenty year old whiz kid at the base of midfield and a record breaking goal scorer at the helm, there have been rumblings, that this could be England’s year.
And with Euro 2016 fast approaching, many residents are scrambling for tickets to see their team do battle in France.
Phishing is when someone tries to get you to give them your private login information. That could be in the form of an instant message that asks, a phony online form made to look legitimate or, increasingly, a text or SMS message.
In the latter form this is known as “smishing.” Smishing is an emerging and growing threat in the world of online security. Read on to learn what smishing is and how you can protect yourself against it.
Of the 7.4 Billion people that inhabit this planet, data compiled by Statista indicates that close to 2 Billion of us indulge in video games; there are now more gamers than the collective population of China and the U.S.
Gambling is not a new phenomenon, in fact archaeological evidence indicates that it existed in rudimentary forms as far back as 40,000 BC when our ancestors threw dice made of bone; around 30,000 years later the Chinese developed a wagering game involving tiles, then came the Persian game of As-Nas in the 17th century, the advent of saloons in 19th century America, and the introduction of the modern casino as we know it, of which there are now some 3500 in existence.
You’ve heard of carjacking, and may recall Nicolas Cage’s performance in Con Air—an action-packed thriller about dangerous prisoners hijacking a plane. Now it’s time to familiarize yourself with Clickjacking, an Internet scam that’s out to steal your clicks.
There’s an old saying that the greatest trick the devil ever pulled was convincing the world that he didn’t exist. Most internet users have encountered Adware at some stage but few people actually know much about it. Like the devil in question, Adware doesn’t seem to exist either.
Except Adware is a very real threat.
Reading detailed reports about online security may sound like a useful cure for insomnia. Instead, you can abandon the reports and use podcasts to keep updated with online security and the threats that are out there.
It’s official! Norton Security has won ‘Best Protection’ for home users in the 2015 AV-TEST Awards for its “high security performance protection without exception in all the certification tests”*.
If you’ve never had a virus you might be tempted to write it all off as a load of people panicking over nothing. How much damage can a virus really cause? Do hackers really steal data and identities and wreck computers?
As far as malware goes, ransomware is probably the one people know the least about. We often hear loads about viruses and worms on the news and on TV, but ransomware doesn’t often get a shout-out.
Online security is a hot topic. There are few weeks that pass by where we don't hear about a new or emerging online security threat, virus, trojan or hacking event. But have you ever wondered about how your online behaviour may be leaving you open to these threats?
How do you create a strong password? It is vitally important that you secure your online accounts with strong passwords that are difficult for any would be cyber-criminal to guess or 'crack'.
Here is a handy infographic with some 'golden rules' for creating a strong password! Feel free to download (right click, and then 'save image'), or click on the icons above to share on social media.
Introducing #30SecTech - a series of quick, bitesize educational videos on a range of topics including cybercrime, internet security, online privacy and more. Plus, we have a bonus! At the end of every video you will find a link to an article providing more background information on each topic. Enjoy!
Your bank account has just been cleared out. It started simply.
You opened your email inbox and an email caught your eye. Your PayPal account needed to be verified, so you opened the email and clicked the link.
And just like that, you’ve been phished.
While the email might have looked like it was from a real person or company, you’ve fallen for a clever scammer’s trick. To help stop you from being phished, we’ve taken a look at 11 ways you can tell if an email is trying to steal your personal information.
There are few things as depressing as discovering that your computer has a virus and that you haven’t backed up all your treasured files and photos. All it takes is one wrong click or bad download.
Most people are willing to try everything up to and including an exorcism to get their machine back online. But are there ways to tell that your computer has been infected before it eats all your files? There are, as it so happens, and here’s what you can do about it.
What to look out for: If you start your computer and find yourself faced with a barrage of pop-up ads, it’s safe to assume that you have a problem. Or multiple problems all popping up at once.
A key figure behind an online banking scam which has seen tens of millions of pounds drained from online bank accounts has been recently arrested after collaboration between the FBI and National Crime Agency with support from authorities across Europe.
“Dridex” is the name of a particularly virulent strain of malware used to steal information such as usernames and passwords from Windows PCs, with the intention of breaking into bank accounts and siphoning off cash. Norton/Symantec has been following Dridex for some time and those already using the latest versions of Symantec or Norton security solutions are protected against the threat.
What is malware? You’ve probably heard the word ‘virus’ being thrown around online, or even by your parents when wondering “Why won’t this godforsaken contraption work properly?” We know viruses are bad, but what exactly are they and how can you protect yourself from them? In this article we will learn about viruses and other forms of malware.
First, a virus is a software program designed to make its way onto your computer with the intention of getting up to no good. Viruses aren’t the only danger to your computer though, just the most commonly known form.
Viruses are a type of malware, or ‘malicious software’. There are many forms of malware out there in the digital world, all designed to cause some sort of havoc.
So you’re the proud owner of a Mac. Congratulations.
Chances are you think its operating system, OS X, completely guards against viruses and other malware and that you don’t need Internet security software. But is this really the case? Read on to find out why it’s a good idea to bolster your Mac’s own protection with a comprehensive security solution.
But I thought Macs were safe…
A Mac running OS X is indeed more secure than a PC running Windows, but that doesn’t mean Macs are completely immune to threats. The Mac’s sandboxed operating system makes it harder to crack, but it’s not unhackable and remains vulnerable to risky user behaviour.
Mobile banking is convenient, simple, fast and flexible – allowing us to access our accounts 24/7 and on the go. We can pay bills, move funds, buy stuff, check our account balance, deposit money and request emergency cash without even setting foot inside our bank’s physical building. With our smartphones and tablets, we can carry our virtual banks in our pockets wherever we go.
But along with this convenient money management comes added risk. Criminals previously had to physically break into banks directly to take our money. Now it’s easier for them to target us, the customers, instead – aiming to defraud us, steal our identities and siphon funds from our accounts.
If you use mobile banking, you need to protect both your phone and your financial information from hackers, identity thieves and malware. We’ll show you how to do this simply with these five tips for safer mobile banking.
Webcams are great fun. They allow us to talk face to face and in real time with family and friends who live a long way away, hold work meetings with colleagues around the globe, and make videos to post online. Plus you can see each other’s facial expressions and other non-verbal body language cues, making for a much better communication experience than a text chat or ordinary phone call. They’re also widely accessible, as they’re cheap, small and simple to use and are usually pre-installed on laptops.
What’s risky about webcams?
Webcams may feel private – but they’re not. If the person you’re talking to via webcam records you, they can share the video (or any stills they take) with other people, post the content online, share it on Facebook, or email it to someone.
We’re not talking ancient Greek pottery here, but one of the most prevalent issues in Internet security today. But what exactly is grayware? Why is it a problem? And how should you deal with it? Read on to discover all you need to know about grayware.
So, what is grayware and what’s the big deal?
As its name might suggest, grayware is a category of software that sits in that ‘gray area’ – a sort of no-man’s land – between outright malware and legitimate conventional software.
We do love our mobiles, and our passion for them is on the rise. According to eMarketer, over a third of the world’s population will own a smartphone by 2017. But we’re not the only ones with a desire for these devices. Cybercriminals, too, have an appetite for mobiles: the Symantec Internet Security Threat Report (ISTR) shows that 38 per cent of smartphone users became victims of cybercrime in 2013.
The phenomenal growth in use of smartphones and tablets, along with our sometimes not-so-smart attitude to security, means that our mobile devices are easy and plentiful targets. As well as containing masses of valuable personal data, our mobiles are the perfect way for cybercriminals to get at us.
And with Wired reporting that mobile broadband subscribers are forecast to reach 5 billion worldwide in 2016, there is a vast and widening pool of potential victims.
Many people think you don’t need security for a mobile device, but read on and you’ll see why it’s essential. Here are our top 5 reasons to protect your mobile with security software.
With a growing amount of harmful and increasingly sophisticated software prowling the Internet, it’s essential to understand what spyware is and the problems it can cause. Spyware may be much more than an irritation as it can pose major privacy and security risks. Below, we’ll explain what spyware aims to do, how it gets into your computer and how you can avoid it.
Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party. Sometimes spyware asks for your consent first. More commonly, it installs itself on your computer without you knowing and runs in the background, secretly collecting data, sending you targeted adverts or meddling with your computer set-up.
As #BetaParents, we are the first generation of parents to raise children in the all-digital world; responsible for keeping them safe online.
Learn more about teaching your children healthy online habits with our free guide. CLICK HERE for the guide.
Of course, we’re talking about web cookies here – not the furry blue Sesame Street Muppet. Web cookies, unlike the treat-loving Cookie Monster, follow your movements on the Internet, collecting and storing information about you. No need to panic though: for the most part, cookies are intended to enhance and customise your browsing experience and are as harmless as the fluffy puppet.
However, because they can collect sensitive personal data, tracking cookies are sometimes considered to be a potential privacy concern. Continue reading to find out all about cookies: what they are, what they do and how you can manage them.
- blog (3)
- digital trends (34)
- family security (22)
- gaming and entertainment (10)
- how to guides (25)
- internet of things (9)
- mac tips (2)
- mobile insights (12)
- mobile safety (23)
- online safety (46)
- online safety tips (29)
- online security (53)
- online security tips (33)
- online threats (40)
- optimise your device (11)
- parental control software (6)
- social media (10)
No one can prevent all cybercrime or identity theft.
The Norton brand is part of NortonLifeLock Inc.
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.