www.fgks.org   »   [go: up one dir, main page]

Cyberthreat

Cyberthreat Protection

How To

Most popular in Cyberthreat Protection

How to free up RAM: 19+ effective methods for Windows and Mac
Here are several ways to free up RAM on your computer. 1. Restart your device 2. Use another browser 3. Clear RAM cache 4. Update software 5. Delete extensions.
Updated: February 23, 2024 ·8 min read
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Published: October 25, 2023 ·9 minutes
Is my phone listening to me? Yes, here’s why and how to stop it
Is my phone listening to me? Yes. Read more from the Norton blog about why it happens and how to help stop it.
Published: June 13, 2023 ·2 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Malware

What to do if a scammer has your email address – 8 tips
What should you do if a scammer has your email address? Find out if scammers have hacked your email account and what they can do with your email address.
Updated: July 12, 2024 ·8 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
What is a macro virus? + How to remove one
A macro virus is written in the same language used by Excel, Word, and similar programs. Learn how macro viruses work and how to spot them.
Updated: May 13, 2024 ·7 min read
Trojan viruses: Detecting and removing
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: May 08, 2024 ·6 min read

Try our malware removal tools for free

Try our malware removal tools for free

  • Virus scanner and removal tool

    Use our virus cleaner Norton AntiVirus Plus to help scan and protect your device in just four simple steps.

  • Spyware detection and removal tool

    Use Norton 360 Standard to help find and remove spyware and other malicious software from your device.

  • Malware scanner and removal tool

    More than just a malware removal tool, Norton 360 Standard packs a suite of online security features.

Online Scams

How to stop spam texts: An easy 4-step guide
Learn how to stop spam texts by blocking numbers, reporting scams, using spam filters, and adding your number to a list.
Updated: July 10, 2024 ·10 min read
Life savings gone––How a woman lost all her money to a scam
A scam victim shared her story with us. This is what we can learn from it.
Published: July 10, 2024 ·6 min read
The toll of a phishing scam on a small business owner
The scammers hacked into the business owner’s PayPal account, stealing his money, personal details, and peace of mind.
Published: July 09, 2024 ·5 min read
E-card scams—Beware of what lurks in your inbox
E-card scammers pounce on your inbox with a "sweet" message. But don't be fooled—these sneaky scams can swipe your personal info in a snap.
Updated: July 01, 2024 · 6 min read

Emerging Threats

What is smishing? How to spot + avoid an attack
Smishing is a type of phishing carried out via text message. Read this guide to learn how smishing works, warning signs, and how to stay safe.
Updated: June 26, 2024 ·11 min read
What are Spam Risk calls and what should you do about them?
Spam risk calls disrupt your privacy and signal a scam attack. Learn why calls are marked “spam risk” and how to protect yourself.
Published: June 21, 2024 ·8 min read
When an audio deepfake is used to harm a reputation
A school principal from Maryland was the victim of a frame job using AI technology. This is what we learned.
Published: May 08, 2024 ·5 min read
DDoS: What is a Distributed Denial of Service attack?
Learn about DDoS attacks and help avoid them with our comprehensive cybersecurity guide, featuring DDoS types and safety tips.
Updated: May 03, 2024 ·13 min read

How To

How to clear cookies and cache in every browser
Learn how to clear cookies and cache in the most popular browsers with our simple step-by-step guide.
Updated: July 15, 2024 ·8 min read
How to password protect a folder on Windows and Mac
Follow this step-by-step guide to learn how to password protect a folder on Windows and Mac devices, plus additional tips to keep your files secure.
Published: July 15, 2024 ·12 min read
How to delete cookies from your iPhone
Learn how to delete cookies on iPhone browsers like Safari, Chrome, and Firefox to limit internet tracking and online profiling.
Published: July 09, 2024 ·5 min read
Instagram hacked? How to get your account back
Is your Instagram hacked? Find out how to get your Instagram account back and how to protect yourself with our guide.
Updated: June 25, 2024 ·13 min read

Want more?

Follow us for all the latest news, tips and updates.