Quantcast
Channel: Norton - 博客 - Norton Protection Blog
Browsing all 199 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Attackers Are Exploiting a New Adobe Flash Zero-Day Vulnerability

Adobe announced it will soon issue an update for its Flash Player in response to the discovery of critical vulnerability CVE-2016-1019, which is currently being exploited in the wild. According to...

View Article


Image may be NSFW.
Clik here to view.

How Do Firewalls Prevent Computer Viruses?

You’ve likely heard the word ‘firewall’ used to describe a measure of prevention against cyber criminals. But that doesn’t mean you know how a firewall actually works, does it?Don’t worry—the truth is...

View Article


Image may be NSFW.
Clik here to view.

What is What is Grayware, Adware, and Madware?

If you’re like most Internet users, you’ve never even heard of grayware, adware or madware. That’s because these are all lower on the threat scale in the world of malicious programming. What’s more,...

View Article

Image may be NSFW.
Clik here to view.

Magnitude and Nuclear EKs Target New Adobe Flash Player Exploit

Adobe has released a patch for a newly discovered vulnerability CVE-2016-1019, which affects Adobe Flash Player.  It has been found that two separate exploit kits known as “Magnitude and Nuclear” have...

View Article

How Can I Tell If I Have Malware and What Can I Do About It?

View Article


Image may be NSFW.
Clik here to view.

What To Do When You Fall For An Email Scam

Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves...

View Article

Image may be NSFW.
Clik here to view.

How Does Malware Get Past Security Software?

Have you ever run your Internet security software only to find out that there’s malware on your computer? How did it get there? When you’re running a full Internet security suite, it can be very...

View Article

Image may be NSFW.
Clik here to view.

How Can I Tell If I Have Malware and What Can I Do About It?

Malware has become a catchall term for various types of cyber security risks, such as viruses, Trojan horses, worms, adware, ransomware and spyware. Many of us use these terms interchangeably to...

View Article


Image may be NSFW.
Clik here to view.

Critical Vulnerabilities Affecting QuickTime for Windows

Two zero-day vulnerabilities showed up recently that could spell trouble for Apple users who use QuickTime for Windows. The ZDI-16-241 and ZDI-16-242 vulnerabilities allow an attacker to run malware or...

View Article


Image may be NSFW.
Clik here to view.

10 Facts About Today's Cybersecurity Landscape That You Should Know

The cybersecurity landscape is constantly evolving with new threats and never-before-seen vulnerabilities being discovered by security experts and, just as likely, exploited by cybercriminals at a fast...

View Article

Image may be NSFW.
Clik here to view.

Teach Your Kids to Avoid Online Scams

Surfing the Internet means possible exposure to online scams, something your children might not have any concept of. If you’re allowing them to go online, it’s imperative that you discuss online scams....

View Article

6 Steps to Take If Your Personal Website Is Compromised

View Article

Image may be NSFW.
Clik here to view.

The Risks of Public Wi-Fi

Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar?...

View Article


Image may be NSFW.
Clik here to view.

BeautifulPeople.Com’s Ugly Data Breach

1.1 Million people are at the risk of having their private data exposed in the underground economy, also known as the Dark Web. Controversial website, BeautifulPeople.com, which claims to have “the...

View Article

Image may be NSFW.
Clik here to view.

Attackers Using Phishing Apps to try to Steal Credentials to Popular Mobile...

As mobile payment platforms become more popular, scammers are taking notice to this uptick in digital currency exchange. Fake Android apps have been discovered on the Google Play Store that pose as...

View Article


Image may be NSFW.
Clik here to view.

May The Fourth Be With You

Did you know that there was more than one Death Star? What’s more, the destruction of each one of them was via one vulnerability, or weakness in the whole system. To celebrate May the Fourth we’re...

View Article

Image may be NSFW.
Clik here to view.

Over 250 Million Email Credentials Retrieved in Data Breach, However, It May...

American cyber investigation company Hold Security has discovered a massive data breach of more than 250 million webmail accounts around the world.The company’s founder, Alex Holden, reportedly told...

View Article


Image may be NSFW.
Clik here to view.

How To Stay Ahead of Zero Day Vulnerabilities

Zero Day Vulnerabilities are a newly discovered software vulnerabilities that are unknown to the manufacturer. A software vulnerability is a weakness in the software where cybercriminals can sneak...

View Article

Image may be NSFW.
Clik here to view.

How a Gmail Password Stealing Scam Works

Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesn’t rely on otherwise easy-to-spot phishing methods. Here’s what you...

View Article

Image may be NSFW.
Clik here to view.

What Is a VPN? And Why You Should Use a VPN on Public Wi-Fi

If you’ve ever wondered if it’s safe to use public Wi-Fi, you are not alone. In fact, according to the Norton Cybersecurity Insights Report, 6 in 10 consumers believe using public Wi-Fi is riskier than...

View Article
Browsing all 199 articles
Browse latest View live