Norton UK Blog
Researchers have recently discovered more than 800 apps on the Google Play store that contain an information-stealing ad library dubbed Xavier. Google has been notified and has already removed a number of the apps containing the malicious ad library from the Google Play Store.
The noughties has been the age where consumers and businesses finally realised the convenience of cloud storage and computing – and rightly so! Your data and documents are now readily available, easily accessible and taking up virtually no extra personal space.
Travel used to be about getting away from it all — your phone, mail, work. Now mobile devices and public Wi-Fi keep us connected while we’re away from home. But that doesn’t mean it’s safe to use public Wi-Fi hotspots during your trip. In fact, using unsecured free public Wi-Fi anywhere is extremely dangerous to your information and your identity.
Late last week, reports emerged of a variant of ransomware known as “WannaCry” began infecting around 90,000 Windows computers, and was spotted in about 70 countries.
A well-known form of malware, ransomware ruthlessly holds a computers data for ransom via encryption. If the user doesn’t pay the cybercriminal a certain amount of money within a certain frame of time, their data will be lost forever.
Student life is one of the defining events in our lives. No matter if studying at home or abroad it’s a time to experience life changing moments navigating new waters filled with hectic college schedules. We form new relationships and make a whole lot of serious decisions both in the real and digital world that will shape our future careers.
Everybody has done it. At least once, but probably a lot more. Maybe daily. Maybe even hourly. But just because everybody else is connecting to the Internet via free public Wi-Fi doesn’t mean you should, too.
College can be one of the best experiences of your life, forging new skills through learning and personal connections while also enjoying a great social life. It is also a time for serious choices that will shape your future and starting with the right online protection is one of them to ensure there are no bumps in your career development.
Millennials have grown up with the online world but are they more security conscious than their predecessors - Baby Boomers? Who shares their passwords without a worry and who is more likely to be the victim of cybercrime?
Find out more…
The possessed television from Poltergeist may be the stuff of nightmares but creepware can transform your computer into something from a horror film. Imagine if your laptop was watching you, recording your every move and threatening to ruin your reputation. That’s a reality for many victims of creepware.
Malware is created by hackers and is often distributed over the internet. While many people are considerate of malware as a threat to their desktop computer or laptop, they tend to be more lax when it comes to their tablets and smartphones – which means mobile devices are ripe for the picking when it comes to identity theft, stolen personal information, emptied bank accounts, and viruses meant to break the device in question.
What types of mobile malware exist?
Safer Internet Day is fast approaching and on February 7th online users are being encouraged to unite to make the online world a safer place with this year’s theme being “Be the change, unite for a better internet”.
Have you considered how you can keep your family's personal information safe in the digital world?
Falling for an email scam is something that unfortunately can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Picture the scenario: your poor nan has already been scammed once before. She received an email from a long-lost aunt in Honolulu who offered her the chance of an emotional reunion. She clicked the link or wrote back and began a chain of communication that resulted in the loss of a small fortune.
There’s a new kind of crime in town and it’s starting to make itself known. You may have heard about it in the news, read about it online or worse still, you could have already been a victim. Its name is Ransomware and you certainly don’t want to be inviting it around to your house for high tea.
When you hear about spies you might think of the super slick James Bond and one of his many catchphrases. We’re usually pretty relaxed about installing apps on our phones but did you know that your phone could be hijacked and taken over by a spy?
Shaken not stirred, right?
Most internet users have encountered spyware at some stage but few people actually know much about it...
Spear phishing may sound like something Bear Grylls does at the weekends but it’s actually a pretty sneaky form of cyber-attack. Most people will be familiar with phishing – and spear phishing is like its smarter little brother...
The festive season is a time of merriment for one and all. That includes scammers, fraudsters, and thieves too who use this time of the year to do their worst.
Having a mobile device has become one of life’s essentials and when a loss or theft occurs it can be a sickening feeling, and often one that can be pretty stressful.
While many of us safeguard our desktops and laptops from a cavalcade of online threats, we’re much more lax about our phones. We download apps without a second thought or log into our bank accounts on public networks where just about anyone could be watching in.
One night of the year ghosts and goblins are free to haunt us. Malware and viruses, however, are free to terrorize us all year long. Here’s our…Five most frightful viruses terrorizing computer users everywhere.
We love being connected in the digital world. Whether it’s our smartphone, tablet or Pc device it is hard to imagine a world without them. From online shopping, to gaming to sharing moments with our connections we use the online world in ways that have not gone unnoticed.
Did you know Smartphones and tablets are an increasingly attractive target for online criminals?
Phishing can sometimes be dismissed as a less serious type of cybercrime but it can have devastating effects on people’s lives. How much damage could a scammer seriously do with some login details or some random personal information, you ask? Well, a lot as it turns out.
If you have a Yahoo account, you need to change your password now. If you reuse that password on any other online accounts, you should change that too.
One of the highlights of any holiday is getting away from it all to have a rest and relax. Unfortunately criminals are aware of when we let our guard down and tourists are a key target for them.
Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did you know you might be unaware of some threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte?
Instagram accounts are being hacked and used to lure other users to adult “dating” websites, while earning money for the scammers. Read how to protect yourself.
After working hard all year, taking a holiday is one of those moments you get to relax. We pack our lives into a suitcase, looking forward to that worry free time.
And more often than not we’re accompanied by at least one of our devices on our travels. Understanding how best to protect your devices from all kinds of threats is pretty important but did you know there are some extra precautions you can take when you’re travelling with a smartphone, tablet or laptop?
Gambling is not a new phenomenon, in fact archaeological evidence indicates that it existed in rudimentary forms as far back as 40,000 BC when our ancestors threw dice made of bone; around 30,000 years later the Chinese developed a wagering game involving tiles, then came the Persian game of As-Nas in the 17th century, the advent of saloons in 19th century America, and the introduction of the modern casino as we know it, of which there are now some 3500 in existence.
With the recent news that some of the UK’s major banking companies will be offering their customers the chance to use fingerprint or voice authentication to access their bank accounts biometrics are very much in the spotlight. So, what exactly are biometrics and how could they possibly be as secure as they seem?
You’ve heard of carjacking, and may recall Nicolas Cage’s performance in Con Air—an action-packed thriller about dangerous prisoners hijacking a plane. Now it’s time to familiarize yourself with Clickjacking, an Internet scam that’s out to steal your clicks.
Cybercrime may sound like something that only happens to big corporations or super-secret government agencies, but it happens all the time to regular people and their families.
Cybercriminals use the internet to attack you (or other people) for their financial gain. It can be difficult to guarantee that your family is protected but there are some simple things you can do to keep them as safe as possible.
There’s an old saying that the greatest trick the devil ever pulled was convincing the world that he didn’t exist. Most internet users have encountered Adware at some stage but few people actually know much about it. Like the devil in question, Adware doesn’t seem to exist either.
Except Adware is a very real threat.
By Kevin Haley, Director, Security Response, Norton by Symantec
Today, Norton released findings from a survey of more than 5,000 consumers from the US, UK, Canada, Australia and Japan about their fears of and forays into the connected world. The survey makes it clear that there are two types of people: those who understand smartphones and IoT devices come with risks, and those who do not.
Smartphones are growing increasingly smart and Siri is the perfect example of that. A voice command app, Siri is renowned for her sassy comebacks and funny comments—as well as for making life easier for people who are too lazy or busy to type. With a couple of phrases, you can transform Siri into a personal assistant extraordinaire, but should you use her for everything?
If you’ve never had a virus you might be tempted to write it all off as a load of people panicking over nothing. How much damage can a virus really cause? Do hackers really steal data and identities and wreck computers?
Emails scams are often more subtle than you’d expect; they generally won’t set off any flashing lights or alarm bells like when someone is trying to steal a car. But just like with other forms of break-ins or robberies, there are signs to watch out for.
As far as malware goes, ransomware is probably the one people know the least about. We often hear loads about viruses and worms on the news and on TV, but ransomware doesn’t often get a shout-out.
Most of us have a beloved smartphone that we keep with us at all times, tucked away in our pockets or our handbags. But carrying a phone around with us all day doesn’t mean that we actually fully understand them.
Online security is a hot topic. There are few weeks that pass by where we don't hear about a new or emerging online security threat, virus, trojan or hacking event. But have you ever wondered about how your online behaviour may be leaving you open to these threats?
We hear a lot in the news these days about companies and prominent individuals and celebrities being hacked. However, did you know that anyone with an online presence can potentially have their accounts or online profiles hacked? Do you know what steps you should take if you have discovered you've been hacked?
Your bank account has just been cleared out. It started simply.
You opened your email inbox and an email caught your eye. Your PayPal account needed to be verified, so you opened the email and clicked the link.
And just like that, you’ve been phished.
While the email might have looked like it was from a real person or company, you’ve fallen for a clever scammer’s trick. To help stop you from being phished, we’ve taken a look at 11 ways you can tell if an email is trying to steal your personal information.
There are few things as depressing as discovering that your computer has a virus and that you haven’t backed up all your treasured files and photos. All it takes is one wrong click or bad download.
Most people are willing to try everything up to and including an exorcism to get their machine back online. But are there ways to tell that your computer has been infected before it eats all your files? There are, as it so happens, and here’s what you can do about it.
What to look out for: If you start your computer and find yourself faced with a barrage of pop-up ads, it’s safe to assume that you have a problem. Or multiple problems all popping up at once.
A key figure behind an online banking scam which has seen tens of millions of pounds drained from online bank accounts has been recently arrested after collaboration between the FBI and National Crime Agency with support from authorities across Europe.
“Dridex” is the name of a particularly virulent strain of malware used to steal information such as usernames and passwords from Windows PCs, with the intention of breaking into bank accounts and siphoning off cash. Norton/Symantec has been following Dridex for some time and those already using the latest versions of Symantec or Norton security solutions are protected against the threat.
A computer virus is part of a type of software called malware. Viruses embed copies of themselves in host programs, and use these to spread from one computer to another.
Viruses aim to interfere with your computer’s system and ‘go viral’ – spreading to other computers. Depending on their severity, they may cause annoyance, disrupt operations, access your email and use it to get on to other computers, delete or corrupt files or software, steal information and even erase your hard drive. If your computer starts to behave oddly – freezing, crashing, running slowly or taking longer than usual to respond – you may have a virus.
We’re only human and have a natural tendency to trust others – particularly those in positions of authority. This is true of our behaviour on the Internet as well as in real life. Unfortunately, this quality makes us vulnerable to the tricks of creative cybercriminals. Scareware is a common method such crooks use to defraud us – taking advantage of our trust, our lack of technical understanding and our need to feel safe.
And it can be very persuasive. Just recently, the fake AntiVirus for Android™ app was downloaded from the Google Play Store more than a million times before being discovered and removed.
The best way to protect ourselves and our families from these scams is to be aware of them and know how to deal with them.
Want to know how to spot scareware and avoid becoming a victim? Then read on.
We do love our mobiles, and our passion for them is on the rise. According to eMarketer, over a third of the world’s population will own a smartphone by 2017. But we’re not the only ones with a desire for these devices. Cybercriminals, too, have an appetite for mobiles: the Symantec Internet Security Threat Report (ISTR) shows that 38 per cent of smartphone users became victims of cybercrime in 2013.
The phenomenal growth in use of smartphones and tablets, along with our sometimes not-so-smart attitude to security, means that our mobile devices are easy and plentiful targets. As well as containing masses of valuable personal data, our mobiles are the perfect way for cybercriminals to get at us.
Is your computer behaving oddly? Have your settings changed? Perhaps you’re being pestered by pop-up ads, even when you’re not surfing the web? Or maybe your computer is running slowly, freezing more than usual, or programs are frequently crashing? Sounds like you may have picked up spyware or other unwanted software.
Spyware isn’t just a potential nuisance – it can also pose serious security and privacy risks. Malicious spyware aims to track your online movements and harvest and exploit your private information, such as credit card details and account user names and passwords. It may also change your home and search page settings, install unwanted add-ons, redirect you to offensive sites and even make changes to your computer’s registry.
We’re not talking ancient Greek pottery here, but one of the most prevalent issues in Internet security today. But what exactly is grayware? Why is it a problem? And how should you deal with it? Read on to discover all you need to know about grayware.
So, what is grayware and what’s the big deal?
As its name might suggest, grayware is a category of software that sits in that ‘gray area’ – a sort of no-man’s land – between outright malware and legitimate conventional software.
With a growing amount of harmful and increasingly sophisticated software prowling the Internet, it’s essential to understand what spyware is and the problems it can cause. Spyware may be much more than an irritation as it can pose major privacy and security risks. Below, we’ll explain what spyware aims to do, how it gets into your computer and how you can avoid it.
Spyware is a blanket term given to software that gathers information about your computer and the things you do on it, and sends that information over the Internet to a third party. Sometimes spyware asks for your consent first. More commonly, it installs itself on your computer without you knowing and runs in the background, secretly collecting data, sending you targeted adverts or meddling with your computer set-up.
- blog (4)
- digital trends (34)
- family security (28)
- gaming and entertainment (10)
- how to guides (29)
- internet of things (9)
- mac tips (2)
- mobile insights (13)
- mobile safety (26)
- online safety (63)
- online safety tips (34)
- online security (72)
- online security tips (35)
- online threats (50)
- optimise your device (14)
- parental control software (7)
- social media (14)
** Dark Web Monitoring defaults to monitoring your email address and begins immediately. Please sign in to your account to enter additional information for monitoring purposes.
No one can prevent all cybercrime or identity theft.
The Norton and LifeLock brands are part of NortonLifeLock Inc. LifeLock identity theft protection is not available in all countries.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.