Norton https://www.antivirus-la.com Antivirus & Anti-Malware Software Wed, 25 Jun 2025 16:11:53 +0000 en-US hourly 1 https://www.antivirus-la.com/wp-content/uploads/sites/53/2024/10/NortonFull-Vertical-Light-CMYK-Print-thumbnail-150x150.png Norton https://www.antivirus-la.com 32 32 How to create a secure password https://www.antivirus-la.com/en/how-to-create-a-secure-password/ Wed, 25 Jun 2025 15:55:19 +0000 https://www.antivirus-la.com/?p=1826

How to create a secure password

People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing them across your accounts, create long and unique passwords to keep your accounts more secure. And get Norton 360 Deluxe with its built-in password manager to help keep your passwords safe and protect against hacking.

June 2025 update: 16 billion login credentials have been leaked, affecting Apple, Google, and Facebook users.

  • What happened: A compilation of over 16 billion login credentials, including passwords, has been exposed in one of the largest data leaks in history. Criminals have found and repackaged this information, which is now for sale on the dark web. If exploited, it could be used to compromise your accounts or commit identity theft.
  • What you should do: Use long and unique passwords or passphrases for all your accounts. If you think your credentials may be at risk, update your passwords immediately.

You might be tempted to make your passwords easier to remember or incorporate cues from your daily life, like birth dates, anniversaries, and pet names. Unfortunately, these tidbits of information make your passwords more predictable and leave them more susceptible to brute force attacks, credential stuffing, and dictionary attacks.

 

To better protect yourself from cybercrime and account takeovers, create secure passwords by leveraging randomization, length, originality, and passphrases.

 

5 tips to create secure passwords

 

When it comes to online security, creating long, strong, and unique passwords is your first line of defense. Here are five key tips to create strong passwords, fortify your accounts, and keep your personal information safer online:

Password mistakes to avoid

Make your passwords more secure by avoiding the following:

  • Numerical patterns like “1234”
  • Common words like “password” or “guest”
  • Repeated characters like “1111”
  • Keyboard patterns like “qazwsx” or “asdf”
  • First and last names
  • Pet and family member names
  • Nicknames
  • Important dates
  • Cities you’ve lived in
  • Schools you’ve attended
  • Reversed words like “drowssap”
  • Character substitutions like using “@” in place of “a”

1. Randomize your passwords

 

Random passwords are the ultimate shield against hackers. Since they lack patterns and personal information, it’s nearly impossible for hackers to guess them using dictionary attacks, numerical patterns like “123,” or birthday predictions. You should also avoid falling into the trap of using guessable words that are significant to your life, like nicknames, surnames, pets, cities, and schools you attended.

2. Make passwords long

 

Longer passwords are more secure because every additional character increases the number of possible combinations. That means that it’s harder for hackers to guess your password. It also makes the password-cracking process more time-intensive, which could deter brute force attacks. To maximize account security, make your passwords at least 15 characters long.

3. Avoid password recycling

 

Recycling the same password across accounts makes your passwords less secure. If an attacker compromises one password, all your accounts with the same password are at risk. To boost your password security, create a strong and unique password for every account. You can use a secure password generator to create them and a password manager to store them.

 

4. Use symbols, cases, and spellings

 

Even if you develop a completely original password, it could still be easy to guess if you spell a word correctly, use predictable cases, and don’t use numbers or symbols. Up the ante by incorporating a mix of uppercase (A – Z) and lowercase letters (a – z), numbers (0 – 9), and symbols (#, $, %). Also, don’t substitute letters with symbols or numbers (like “p@ssw0rd”) unless you’re creating a passphrase—most cybercriminals are well aware of this password trick.

5. Opt for long passphrases

 

Passphrases are strings of words that can help protect your accounts in the event of password attacks. They should use a complex and lengthy mix of characters, 5 to 7 words, and symbols. As a bonus, they are easier to remember since you can base them on movie quotes, rhymes, songs, etc., making them especially useful for securing your home computer lock screen.

 

Just don’t use personal information or choose a passphrase directly linked to something you’ve shared publicly. For example, if you’re a loud and proud Swiftie, don’t use one of Taylor Swift’s songs to inspire your passphrase.

If you’re not sure whether your passphrases are strong enough, consider using a random password generator to come up with hard-to-crack ideas.

 

How to remember strong passwords

 

While strong passwords are vital, remembering them can be tough, especially when you’re supposed to have a long, strong, and unique iteration for each account. Consider using a password manager like Norton Password Manager or mnemonics to stay on top of your passwords.

 

Password managers

 

password manager is a secure digital vault that stores all your passwords. You just need to remember one master password to access it. Then, you can securely and conveniently auto-fill your credentials when you visit a website’s login page.

 

Mnemonic devices

 

A mnemonic device is a memory trick that helps you recall information by associating it with something more memorable, such as a phrase or rhyme. You can use these to remember secure and complex passwords—just come up with a memorable phrase or acronym.

 

For example, you know you shouldn’t use your name in a password. But you can use your name as a mnemonic device for a passphrase. So, instead of making your password “AdamC” (your first name and surname initial), you could use the mnemonic device, “AstronautDrivesArmorMiracleCorduroy,” to remember each word of your passphrase. Of course, you also need to mix up the cases and add numbers and symbols.

 

Why is password security important?

 

If passwords aren’t strong and kept secure, cybercriminals could gain access to your accounts. That can lead to scams, financial repercussions, or even identity theft. And then there’s the added stress of recovering hacked accounts or a stolen identity.

  • Scams: If a cybercriminal can access your social media accounts or email with your password, they could scam your contacts or use your own information against you in a social engineering attack.
  • Financial loss: Whether it’s your bank account drained, blackmail, or transferring money from your payment app, the end goal for password thieves is typically financial.
  • Identity theft: If an identity thief has enough information about you, a password could be the final piece of the puzzle they need to achieve their objective. That could be anything from taking out a loan in your name to ordering a new credit card and intercepting it.

Scan the dark web for your passwords

Once they steal your passwords, hackers and phishers may sell them on the dark web – potentially exposing your personal data to a nefarious cohort of scammers, cyber thieves, and other unsavory characters. This puts you at a higher risk of identity theft.

For an added layer of protection, install Norton 360 Deluxe. Its advanced Dark Web Monitoring feature scans the murkiest corners of the internet and alerts you if your personal data is found, so you can take steps to protect yourself.

How are passwords stolen?

 

Cybercriminals steal passwords through a variety of methods using scams or hacking techniques.

  • Data breaches: If your password is exposed in a data breach, hackers can use it to access the associated account.
  • Password-guessing attacks: Dictionary attacks involve hackers trying common words and phrases at scale to guess passwords.
  • Malware: Some types of malware can steal your passwords or record your keystrokes as you type.
  • Phishing: A phishing attack can be designed to trick you into revealing your password. An attack via email or text could also urge you to click a link that takes you to an unsafe website where you enter your password and unknowingly expose it.
  • Social engineering: Phishing is a common type of social engineering attack but there are other examples, like a scareware attack that could lead to a hacker stealing your password.
 

How to keep your passwords safe

 

Password security requires a comprehensive approach. To keep your passwords safe:

  • Create long, complex passwords
  • Use unique passwords for every account
  • Use a reputable password manager
  • Enable two-factor authentication (2FA)
  • Use passkeys instead of passwords. Passkeys are a secure method of signing into your accounts that rely on biometrics or your device’s PIN instead of traditional passwords.
  • Change your passwords regularly
  • Subscribe to data breach alerts
  • Avoid clicking suspicious links
  • Don’t share your passwords with anyone
  • Use a reputable security app like Norton 360 Deluxe
 

Help keep hackers out of your accounts

 

Strong passwords alone aren’t a foolproof defense against all cyberattacks. However, a strong password coupled with a security tool like Norton 360 Deluxe can go a long way toward safeguarding your accounts and devices.

 

Norton 360 Deluxe includes a built-in Password Manager to help you create, store, and secure your passwords. Plus, it offers powerful protection against hackers, malware, and other online threats.

Do you want to protect your devices with the best patch management solution?
👉 Contact us

Read more

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1826
The browsing evolution continues with the AI browser Norton Neo https://www.antivirus-la.com/en/the-browsing-evolution-continues-with-the-ai-browser-norton-neo/ Mon, 23 Jun 2025 15:26:49 +0000 https://www.antivirus-la.com/?p=1804

The browsing evolution continues with the AI browser Norton Neo

As AI transforms how we interact with the web, it’s clear we need a new kind of browser. Enter Norton Neo: an AI-native browser built for the future.

The internet browser has come a long way from static pages and dial-up tones. What started as a simple tool to access information has transformed into a hub for connectivity, productivity, and exploration. Over the years, traditional browsers have introduced features like tabs, search engines, and extensions, making navigating the web more efficient and user-friendly. As AI continues to advance, one notable development is the rise of chatbots — intelligent tools that are reshaping how people interact with websites and services.

 

Now, we’re entering an era of AI-powered advancements, where browsers are becoming smarter and more intuitive. These developments aim to enhance browsing by offering personalized, seamless, and proactive assistance on the web. This blog will explore how Norton is leveraging AI to shape the future of browsing.

 

A brief history of browsing

 

Let’s rewind — the earliest browsers, like Netscape Navigator and Internet Explorer, were groundbreaking in giving people access to a world of information. Over time, browsers like Google Chrome and Mozilla Firefox advanced browser capabilities, improving speed, introducing extensions, and adding tools like tabs and incognito mode to enhance functionality.

 

These browsers have become essential tools for navigating the web, helping people to stay organized and efficient. But what if a browser could be more than just a tool?

 

Enter Norton Neo, the next step in web browsing — a browser designed not just to help you explore the web, but to understand, anticipate, and act with you.

 

From passive browsing to proactive assistance

 

Web browsing has undergone a remarkable evolution — from simple page loading to highly personalized and efficient experiences. Innovations like built-in chat and search, tab management, and personalized content recommendations have improved how we navigate the internet. Neo builds on this evolution, introducing capabilities that push the boundaries of what a browser can offer.

 

1. A browser that thinks with you

 

The way we search online has shifted dramatically. Early search engines provided basic keyword matching, while recent developments have introduced semantic search and voice interaction. The latest frontier involves integrating conversational AI directly into browsing, reducing the gap between query and actionable insight. Neo brings this to life through the Unified Search and Chat feature, transforming search into an intelligent dialogue.

 

2. Turning tabs into time savers

 

Managing multiple tabs has long been a challenge, spawning solutions like grouped tabs and browser extensions to reduce clutter. Modern browsers have introduced tools to suspend inactive tabs and organize them by theme or task. Neo advances this evolution with Smart Tab Management, automatically organizing tabs for a more intuitive workflow.

 

3. Deeper personalization

 

From static homepages to sophisticated recommendation engines, personalization has become a defining feature of the digital experience. Browsers now integrate with machine learning models to suggest content, streamline navigation, and anticipate people’s needs. Neo advances personalization, using adaptive learning to tailor browsing experiences that grow and evolve around how it’s used.

 

4. Preview features

 

As the sheer amount of content online has exploded, so too has the challenge of quickly assessing what’s worth your attention. Innovations like link previews and reading mode have aimed to cut down on decision fatigue. Neo has a Peek and Summary feature, which offers AI-generated summaries and previews, giving people clarity before they commit to a click.

 

5. AI you can trust

 

With AI’s increasing role in digital life, concerns about data privacy, security, and transparency have come to the forefront. While many privacy-focused browsers now offer encryption capabilities and protection against tracking cookies, ensuring that AI-driven features uphold the highest standards of privacy remains a complex challenge. Neo addresses this head-on, integrating intelligent tools built on the same principles of privacy and protection that have defined Norton for years. Designed with privacy in mind, Neo combines innovation with the trusted security standards people have come to expect.

 

Experience the next chapter in web browsing

 

Web browsing has come a long way — from static, text-heavy pages to today’s dynamic and intuitive experiences. Now, it’s time for the next leap: moving from responsive to proactive. Imagine a browser that doesn’t just react but collaborates with you, anticipating your needs and helping you achieve your goals effortlessly.

 

Neo represents this new era. People trying the early access edition of Neo won’t just explore its AI-native features — they’ll play a pivotal role in shaping the future of intelligent browsing. If you’re inspired by a smarter, more adaptive browser, join the waitlist for Neo and help define the future of web innovation.

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1804
What is an IP address? https://www.antivirus-la.com/en/what-is-an-ip-address/ Tue, 22 Apr 2025 13:40:55 +0000 https://www.antivirus-la.com/?p=1746

What is an IP address?

Your IP address is like your digital home address. It lets your devices, like your computer or phone, connect online for things like browsing, shopping, and messaging. Learn how IP addresses work, the different types, and how Norton VPN can help shield your IP from tracking, surveillance, and online threats.

IP address definition

 

An IP address is a unique identifier assigned to a device on the internet or a local network. Short for “Internet Protocol,” IP refers to the rules that dictate how data is formatted and transmitted across networks.

 

IP addresses are essential for the internet’s functionality, facilitating communication by directing data between devices, and ensuring it reaches the intended destination. Each IP address includes location details that make devices identifiable within a network, allowing the internet to differentiate between computers, routers, and websites.

How do IP addresses work?

 

IP addresses work by providing a unique label to each device on a network, allowing them to send and receive data packets according to TCP/IP protocols. Routers and other network devices use these addresses to route packets to their correct destination, ensuring efficient and accurate communication between devices.

 

Here’s a closer look at how IP addresses help facilitate network data transfers:

  1. Device initialization: Your device connects to a network and prepares to communicate.
  2. IP address assignment: The network router assigns separate IP addresses to each network device, after receiving its own IP address allocation from an organization like ICANN (Internet Corporation for Assigned Names and Numbers) via the ISP (internet service provider).
  3. Domain Name System (DNS) resolution: When you enter a domain name (like google.com), the DNS translates it into a machine-readable IP address. This process allows your device to locate and communicate with the correct server on the internet.
  4. Data packet transmission: Data is broken into packets, each containing the source and destination IP addresses. These data packets are then sent by the transmitting device and forwarded across the network.
  5. Network address translation (NAT): NAT modifies IP address information in packet headers as data passes through a router, replacing the private IP address with the router’s public IP address. This allows multiple devices on a private network to share a single public IP.
  6. Routing and switching: Routing uses IP addresses to direct data packets between different networks, while switching handles traffic within a single network, using MAC addresses to route packets to specific devices.
  7. Delivery and response: Data packets arrive at the destination device or server, identified by its IP address. The destination may send a response or acknowledgment back to the source device, using IP addresses to ensure the correct return path.
  8. Renewal and reassignment: Dynamic IP addresses are periodically renewed and reassigned as devices connect and disconnect from networks. This process ensures each device has a valid, unique IP address, preventing conflicts and maintaining efficient network organization.
 

Types of IP addresses

 

Different types of IP addresses are used to manage the limited pool of available addresses, improve security, and meet specific networking needs. These include IPv4 and IPv6 IP addresses, public and private IP addresses, and static and dynamic IP addresses.

IPv4

 

IPv4 is a legacy generation of IP that’s still widely used. They use a 32-bit address format, represented in dotted decimal notation, with a maximum of 15 characters. Its main drawback is limited address space, with only around 4 billion possible unique addresses. To help cope with address exhaustion, ISPs use techniques like NAT, enabling multiple devices to share a single public IP.

 

An example of an IPv4 address is: 192.168.1.1.

 

IPv6

 

IPv6 addresses are the newest IP address iteration. These types of IPs offer a greatly expanded address space, by using 128-bit addresses written as eight groups of four hexadecimal digits. This allows for more than 340 undecillion unique addresses — a limit we’ll likely never hit. IPv6 also improves routing efficiency and network security by incorporating IPsec authentication and encryption protocols.

 

An example of an IPv6 address is: 2401:0fc8:85b3:0000:0000:8b6e:0730:7314.

 

Public IP address

 

A public IP address is assigned to devices like routers, which are directly accessible over the internet. Public IPs are globally unique and traceable, which allows external devices to communicate with your network — but it also makes them visible and traceable to a specific location. To enhance privacy and security, devices within a local network typically share one public IP address.

 

Private IP address

 

private IP address, or local IP address, is assigned by your router to devices within your local network. Each device gets a unique private IP to help the router direct traffic correctly. Unlike public IP addresses, which are visible on the internet, private IPs remain confined to your local network, which means they don’t need to be universally unique and can be reused across multiple networks.

 

Static IP address

 

Static IP addresses, also known as dedicated or fixed IP addresses, don’t change. Once a device is assigned an IP address, that address remains the same. Static IP addresses are common for web servers, email servers, or other devices that need to be consistently accessible at the same address.

 

Dynamic IP address

 

Dynamic IP addresses are temporary addresses assigned to devices by a network’s DHCP server each time a device connects to the network. This allows efficient use of available addresses, making it ideal for networks with many users. Dynamic IPs also offer security benefits, since their changing nature makes it harder for hackers to target.

 

How to find your IP address

 

You can find your public IP address by Googling “What is my IP?” Google and other web services know your IP address because it’s assigned to your device and is required to connect to the internet in the first place. When you search, Google usually displays your public IP address in an info box, but you might need to scroll down a bit to see it.

But if you want to see your computer or phone’s network-provided IP address — known as your private IP address — you’ll need to look up the local IP directly on your device.

 

Find your IP address on Windows

 

Here’s how to look up your IP address on a PC:

  1. Go to Start > Settings > Network & internet.
  2. Select Wi-Fi (for wireless connections) or Ethernet (for wired connections).

3. Click your network’s Properties icon, then scroll until you see your IP address.

Find your IP address on Mac

 

To find your Mac’s IP address, follow these steps:

  1. Open System Settings > Wi-Fi > Details.
  2. Scroll until you see your IP address.

Find your IP address on Android

 

You can also check your phone’s IP address by following these steps:

  1. Go to Settings > About phone.
  2. Scroll down until you see your IP address.

Find your IP address on iPhone

 

To see your iPhone’s IP address:

  1. Go to Settings > Wi-Fi.
  2. Tap the blue info icon next to your network.

3. Scroll down to see your IPv4 and (if applicable) IPv6 IP addresses.

You may see multiple IP addresses listed if you’re assigned a public IP address from your cellular carrier and a private IP address from your Wi-Fi network.

 

What can someone do with your IP address?

 

If someone has your IP address, they can approximate your location, track your online activity, and potentially target you with ads or cyber attacks. While an IP alone won’t typically lead to hacking, it can be a starting point for identifying and exploiting vulnerabilities in your network.

 

Here’s a closer look at ways a cybercriminal may use your IP address:

  • Monitor your online activity: A criminal could monitor your online activity using your IP address by intercepting network traffic or exploiting vulnerabilities to access your devices or data.
  • Launch cyberattacks: Your IP address could be used to launch attacks like DDoS attacks, overwhelming your network with traffic to disrupt your connection. They may also target you with spyware or malware, potentially gaining access to your device and personal data.
  • Personalize spam and scams: Cybercriminals can use your IP address to find your general location. Later, they can leverage this information to personalize scams and spam messages, making them seem more relevant to you.
  • Impersonate you: If a hacker has your IP address, they could attempt to impersonate you by spoofing your IP to make it seem like their activity originates from your device.
 

How to hide your IP address

 

Common methods for hiding an IP address include using a VPN, proxy server, NAT firewall, or anonymizing browser. You can also try connecting to a non-static IP address or resetting your router.

 

Here’s a closer look at different ways to hide your IP address:

  • VPNs: A VPN hides your IP address by encrypting and routing your internet traffic through a VPN server, which assigns you a new IP address and masks your original one.
  • Proxy servers: Although they typically lack encryption, proxies can help hide your IP address by displaying their server IP address to the sites you visit.
  • Dynamic IP addresses: Your IP address won’t exactly be obscured, but by changing periodically, dynamic IP addresses assigned by a public Wi-Fi network or your mobile carrier make it harder for you to be tracked or targeted.
  • NAT firewalls: A NAT firewall on your router helps hide your IP address by using a shared public IP for multiple devices, preventing incoming traffic from accessing your devices directly without port forwarding.
  • Reset your modem: Resetting your modem can assign a new dynamic IP address, replacing your previous IP and disrupting any ongoing tracking or attacks aimed at your old IP address.
  • Browse with Tor: By routing your internet traffic through an encrypted network of server “nodes,”  Tor helps mask your original IP address — although it is still exposed to the first node in the network.
  • Reset your router: Performing a router reset may assign a new local IP to devices, but it won’t necessarily change your public IP unless your ISP provides a dynamic IP.
 

Mask your IP address

 

Don’t want hackers turning up on your digital doorstep? Hiding your IP address with a VPN from a trusted brand is the most effective and reliable way to boost your internet privacy and security.

 

Norton VPN helps shield your IP address from prying eyes looking to track your online activity, uncover your location, or steal sensitive personal or financial data. Thanks to bank-grade encryption, your IP is masked, and your data is routed through a secure tunnel, helping to ensure a private and secure online experience every time you connect.

 

To receive more information about Aufiero Informatica, please click here

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1746
How to remove a virus from an Android phone in 6 steps https://www.antivirus-la.com/en/how-to-remove-a-virus-from-an-android-phone-in-6-steps/ Wed, 09 Apr 2025 16:07:00 +0000 https://www.antivirus-la.com/?p=1538

How to remove a virus from an Android phone in 6 steps

Is your phone slowing down or overheating? Unusual behavior could be a sign you have a virus. Learn how to remove viruses from your Android and discover how Norton can help stop scam attempts and malware from stealing your information or money.

Threat intelligence researchers estimate that as of March 2025, there are almost 36 million instances of malware on Android devices. Viruses, one common type of malware, lurk in downloadable files and apps that you can unknowingly install on your device. While removing them might seem daunting, you can often get rid of viruses on your phone in just a few simple steps.

 

This step-by-step guide will show you how to remove viruses. Plus, you’ll learn some warning signs of an infection and tips to help keep your phone or tablet safe from malware.

 

1. Run an antivirus scan

 

An antivirus app like Norton Mobile Security can be your Android’s best friend. Often, a quick scan is all it takes to identify and eliminate unwanted malware.

 

To run an antivirus scan, open your antivirus, click the scan button, and follow the on-screen instructions. Some antivirus programs let you schedule regular scans, while others offer real-time protection. A good antivirus will help eliminate any virus from your device.

 

2. Clear your cache and cookies

 

If your phone has malware, you should clear your browser’s cache and cookies. This can help remove hidden malicious files or data that malware might use to operate.

 

Here’s how to clear the cache and cookies on Chrome, one of the most popular browsers for Android users:

  1. Open Google Chrome.
  2. Tap the three-dot menu in the upper-right corner.
  3. Select Delete browsing data.
  4. Choose All time from the drop-down menu, then select Delete data in the bottom-right corner.
 

3. Reboot your device in safe mode

 

Rebooting your device in safe mode — a stripped-down version of your operating system used for troubleshooting — disables third-party apps (the ones you’ve installed yourself) and prevents them from accessing features like your camera or maps. This can stop malware, such as spyware, from running through those apps while you’re trying to remove it.

 

Here’s how to reboot your Android device in safe mode:

  1. Hold down the power button on the side of your device.
  2. Press and hold the Power off button on your screen.
  3. Press OK to confirm you want to enter safe mode.
 

If your phone behaves normally in safe mode, it could indicate that malware is hidden in a third-party app. Signs of malware include slow performance, overheating, or apps opening and closing suddenly.

 

4. Remove infected apps and files

 

Search for unfamiliar files or apps you don’t recognize — delete anything suspicious. To remove an app, long hold it until it starts jiggling, then tap uninstall.

 

Fake apps that may contain malware should be the first thing you remove. Look for these signs when reviewing your apps:

  • Unusual permissions: Check your app permissions and ask yourself whether you actually granted them. If an app has access you don’t remember approving, consider removing it.
  • Duplicate apps: If you see two apps with the same name and icon, one might be fake. Remove them both, then re-download a trusted version from the official Google Play Store.
  • Non-official sources: Apps downloaded from unverified websites are more likely to contain malware. Look for apps you didn’t install from a developer’s official website or the Google Play Store.
  • Negative user reviews: Check customer reviews to see if others have reported malware. If they have, uninstall the app.
  • Unusual design: Apps with odd layouts, broken features, or that mimic others may be spoofed. These are more likely to contain malware — best to delete them.
 

After checking to see if you have suspicious apps, move on to your files. You can review your files using Google’s built-in Files app to explore system folders.

 

If you find any suspicious files, look them up before deleting them, as removing vital files could cause additional problems for your phone. If you’re unsure if a file is malware or a crucial system file, it’s best to use dedicated antivirus software, like Norton Mobile Security, which will help identify and remove harmful files for you.

 

5. Activate Google Play Protect

 

Google Play Protect provides you with a free extra layer of protection against sneaky malware. It’s a built-in defense system that scans apps and warns you if something looks suspicious. It could help you avoid installing dangerous apps in the first place.

Here’s how to turn on Google Play Protect:

  1. Open Google Play and select your profile icon in the upper-right corner.
  2. Select Play Protect, then the gear icon in the upper-right corner.
  3. Toggle on Scan apps with Play Protect and Improve harmful app detection.
 

Enabling “Improve harmful app detection” will scan apps downloaded directly from websites. While this feature adds an extra layer of protection, it’s still essential to verify the developer and ensure you’re downloading apps from their official website.

 

6. Perform a Google account security checkup

 

Once you’re sure your device is free of malware, perform a Google account security checkup. Malware can collect your Google account credentials or take control of your account. A quick security checkup could help lock down your account and keep your information safe.

 

Here’s what you should review during the Google security checkup:

  • Saved passwords: If you use Google Password Manager, review your passwords to see if any are weak or compromised. Change them to strong, unique passwords to keep your passwords secure.
  • Devices logged in: Review the devices connected to your Google account. If you find an unauthorized device, remove it immediately and update your account password.
  • Security activity: Check for any unusual activity, like login attempts from places you don’t recognize. This could be a sign your account has been compromised through malware or a data breach.
  • Two-factor authentication: Enable two-factor authentication (2FA) to add an extra layer of security, protecting you from account takeovers. This makes it much harder for hackers to access your account, even if they have your password.
  • Third-party apps: Review the apps that have access to your Google Account. If you don’t recognize any or haven’t used them in a while, revoke their access to prevent unwanted data collection.
 

Last resort: Factory reset your device

If you’ve tried everything and your phone still has malware, factory reset your device. This will erase all the apps and files on your phone, so don’t forget to back up your important data first.

 

Here’s how to factory reset your Android phone:

  1. Open Settings, scroll down and tap System.
  2. Scroll down to the bottom and select Reset options.
  3. Select Erase all data (factory reset).
 

In case you missed the very first step, run an antivirus scan like Norton Mobile Security for Android before attempting a factory reset. It could save you from losing all the files on your phone and the hassle of having to set it up again.

 

Signs your Android phone may have malware

 

If your phone is overheating or running slowly, or its battery drains quickly, it might have malware. Act immediately to stop hackers from collecting your data or encrypting your files and holding them for ransom.

 

Here are some signs your Android device has malware:

  • Your device is behaving strangely: Phone slowdowns, overheating, or fast battery draining could be signs malware is putting excessive strain on your device. You’ll want to reset your phone in safe mode to find out if an app is causing this.
  • You’re getting too many pop-up ads: Seeing too many pop-up ads may be a sign your phone has a specific type of malware known as adware. Adware can collect your information, sell it to other companies, and bombard you with annoying advertisements.
  • Your phone has unrecognized apps: Look at your app list to see if you have any apps you don’t recall installing yourself. These could be malware that snuck onto your phone and self-installed without you knowing.
  • You have unusually high data usage: A sudden spike in data use could be a sign that malware is sending information from your device to cybercriminals. Check your data usage in your phone’s settings or on your bill (if you have data limits), and disconnect from the internet if anything seems off.
  • You’re receiving unsolicited messages: This might mean that malware on your device has already shared some of your personal data with cybercriminals. Unsolicited messages could be part of smishing attacks to trick you into revealing more sensitive information.
  • Your phone is sending messages: Some malware can access your phone’s messaging app and text your contacts. If somebody asks you about weird messages coming from your number, it could be a sign your device is compromised.
 

Knowing the signs is the first step to getting rid of malware from your Android device. To be safe, run an antivirus scan right away to detect and delete any threats.

 

Tips to help protect your Android device against malware

 

The easiest way to help shield your Android device from malware is to install a robust antivirus solution. You can also boost your protection by updating your software, avoiding suspicious links, and using strong passwords.

 

Here are some tips to protect your Android device:

  • Use antivirus software: Good antivirus software, such as Norton Mobile Security for Android, can help keep your phone safe. It also saves you from needing to remove malware manually.
  • Keep software up to date: Outdated software can be full of exploits hackers use to access your phone. Updating software gives you the best chance to avoid these weaknesses.
  • Don’t click suspicious links: Suspicious links can lead to unsafe websites, which could automatically install malware on your device. Avoid any links in unsolicited messages — whether you receive them via text, email, or social media.
  • Use strong passwords: Create strong passwords for each account to reduce your chances of account takeovers. Make each account password unique, as reusing passwords makes you vulnerable to brute-force attacks.
  • Avoid untrustworthy apps: Only install apps from the Google Play Store or directly from a reputable developer’s website.
  • Avoid rooting your phone: Rooting removes the built-in restrictions of the operating system, allowing deeper customization, but it also weakens your Android’s security.
  • Avoid unsecure Wi-Fi connections: Public Wi-Fi connections are usually less secure than private ones. To secure your internet connection when using public Wi-Fi, use a VPN for encryption. This helps protect you from hackers performing man-in-the-middle attacks on the network.
 

What can viruses and other malware do to your Android phone?

 

Malware and viruses can steal your sensitive information, infiltrate your device to install even more malware, and encrypt your files to hold them hostage. In extreme cases, malware can even wipe your system, leaving your device unusable.

 

Ultimately, most cybercriminals create malware to make money. They’ll try to extort funds directly from you, peddle your personal information on the dark web, or even steal your identity. That’s why wiping out any viruses from your Android before they can wreak havoc on your digital life is crucial.

 

Keep your Android phone safer from malware

 

Phones are prime targets for malware because they store so much personal data. Just think of all the information you entrust to your phone!

 

Help safeguard your device and valuable data with Norton Mobile Security for Android, which can warn you about shady apps and fraudulent websites. By taking proactive steps and arming yourself with the right tools, you can keep your Android safer from malicious threats.

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1538
Ransomware statistics: Facts and trends for 2025 https://www.antivirus-la.com/en/ransomware-statistics-facts-and-trends-for-2025/ Tue, 01 Apr 2025 15:04:51 +0000 https://www.antivirus-la.com/?p=1482

Ransomware statistics: Facts and trends for 2025

Ransomware is an ever-growing threat to businesses, organizations, and individuals everywhere. The more you know about this cyber-menace, the better protected you are. Learn about some of the most alarming ransomware statistics, and defend against ransomware attacks and other digital threats with a state-of-the-art Cyber Safety tool.

Ransomware is an insidious variety of malware that cybercriminals use to encrypt their targets’ essential system data and effectively lock users out of their software. The attackers then threaten to further restrict access or leak sensitive information unless their victims pay up. Ransomware attacks frequently target large organizations like schools, hospitals, and corporations.

 

With so many organizations reliant on IT infrastructure, ransomware attacks can have a devastating impact. Keep reading for the latest statistics and trends in ransomware, and learn what you can do to protect yourself and your organization.

 

Key ransomware statistics

  • According to a Gen Threat Reportransomware attacks surged by 50% in the final three months of 2024, building on the 100% increase that had already happened in the three months prior.
  • In 2023, 66% of organizations reported experiencing a ransomware attack according to a 2024 Sophos survey. But ransomware attacks are likely to be grossly underreported.
  • In fact, Black Fog estimated that in June 2024 the ratio of unreported attacks was at 774% — meaning at least seven times more attacks occurred than were reported. This is despite improvements in reporting in recent years, highlighting the sheer scale of the ransomware problem.
  • According to an ExtraHop survey91% of ransomware victims paid at least one ransom within the last year, despite 88% of surveyed organizations reporting that they’re confident in their organizations’ ability to manage cyber threats.
  • Small businesses are among the most vulnerable to lasting damage. A University of Maryland study found that following a ransomware attack, 60% of small businesses folded within six months due to the financial repercussions, as many of them did not have the resources to resist effectively.
  • When vital institutions like hospitals are targeted, ransomware attacks can be deadly. A study conducted by the University of Minnesota found that among patients already admitted when an attack begins, ransomware attacks on hospitals result in 35% to 41% increases in in-hospital mortality rates. This is because ransomware disrupts critical care, jeopardizing the lives of patients in critical conditions.
 

How frequent are ransomware attacks?

 

In the first half of 2024 alone, more than 2,500 attacks were reported, amounting to 14 per day, but those attacks are just the ones that got reported. According to another study, the number of reported ransomware attacks — both failed and successful —  in 2023 amounted to about 10 attempts per second.

 

Semperis, an expert Active Directory security company, even updated their general philosophy to “assume constant breach” in their 2024 Ransomware Risk Report, which found that 74% of survey respondents reported being targeted by ransomware multiple times within the previous 12 months.

 
 

It’s easier than ever to launch a ransomware attack, thanks to the spread of Ransomware-as-a-Service (RaaS) and the accessibility of hacking tools. RaaS is now available for purchase on the dark web, meaning hackers don’t have to create their own ransomware to carry out attacks.

 

LockBit is one of the most popular RaaS providers, responsible for 24% of ransomware attacks worldwide in 2023. In fact, the top five ransomware variants are all RaaS:

  1. Lockbit
  2. ALPHv/BlackCat
  3. Cl0p
  4. Play
  5. Black Basta
 

Among the different kinds of ransomware attacks, supply-chain attacks are gaining prominence. Of the data breaches that occurred in 2023, 15% involved a third party or supplier. Meanwhile, one of the most notable ransomware attacks of 2024 targeted Blue Yonder, a supply chain software company, resulting in widespread fallout with two of its biggest clients: Starbucks and Morrisons, a supermarket chain.

 

Supply-chain ransomware attacks are especially effective as they have ripple effects not only across the targeted organization, but throughout the industry the target serves. As organizations become more interconnected and rely on centralized systems, they’re increasingly vulnerable to ransomware attacks. This vulnerability is often exacerbated by victims’ urgent need to prevent disruptions in their operations, which can lead to hasty decisions regarding payments.

 

Law enforcement steps up, but so do threats

 

At the end of 2023, a major bust-up of the ALPHv/Black Cat gang’s ransomware operation scored a big win for law enforcement. This helped around 500 victims avoid paying $68 million in ransom demands collectively. By the time the FBI acquired ALPHv’s encryption keys, the gang had already exploited over 1,000 victims and accepted $300 million worth of ransom payments.

 

However, with every cybercriminal operation that gets busted, another one sprouts up to take its place, and the newcomers are often even more formidable. For example, the LockBit ransomware group got in touch with ALPHv’s affiliates, convincing them to switch over and continue negotiations with victims.

 

As a result, 2024 was LockBit’s biggest year ever — until the FBI got ahold of 7,000 encryption keys. This is good news for law-abiding netizens, but it won’t be long before another ransomware gang crops up to take its place.

 

Types of ransomware

 

There are many types of ransomware out there, as well as multiple ransomware groups. Ransomware-as-a-Service is by far the most popular type of ransomware, with the top five attackers in the United States being RaaS.

 

Lockbit, APLHv, and Cl0p are among the most notorious ransomware strains of the past year, with relative newcomer Play, which first appeared in 2022, also proving to be a formidable threat. In 2023, Play attacked IT service provider Xplain and published 65,000 files relating to the Swiss government on the dark web.

 

Other types of ransomware specifically target individual users and small businesses, demanding thousands of dollars rather than millions. Here are the top ransomware strains of 2024:

  1. RansomHub
  2. LockBit
  3. Medusa
  4. Play
  5. INC
 

Common ransomware targets

 

Ransomware attackers go where the money is. This means industries and high-income countries, rather than consumers and lower-income countries, are more likely to be attacked. Here’s the breakdown of the most common ransomware targets.

 

Businesses

 

Retailers saw the biggest increase in ransomware attacks, experiencing a 22% rise in attacks per week. Financial service providers are also targeted more frequently. By the end of 2024, 65% of financial organizations worldwide had reported being hit by at least one ransomware attack.

 

Healthcare and public health organizations, including hospitals, are also among the most likely to be targeted. Critical infrastructure sectors and organizations are popular targets because they’re more likely to pay a ransom to restore access quickly to critical services.

 

The top five industries with the most reported ransomware attacks in 2024 were:

  1. Manufacturing
  2. Finance
  3. Service
  4. Retail
  5. Food and Beverage
 

The education sector is also increasingly targeted by ransomware. In 2023, attacks against K-12 schools increased 105%, while attacks on higher education increased 70%.

Individuals

 

While ransomware attacks primarily target large organizations that can presumably afford a hefty ransom, some attacks are pure extortion against customers and end users. In 2023, the Cl0p ransomware gang hacked MOVEit transfer — a secure managed file transfer software — and held the data of nearly 18 million individuals hostage.

 

More broadly, one-third of American consumers reportedly had their data stolen in 2023, totaling 6 terabytes. Personal identity and health information were the most likely information to be stolen.

 

Specific countries

 

The United States experienced more ransomware attacks than any other country in the last few months of 2024, with half of all attacks targeting it. Meanwhile, France experienced the highest rate of attacks throughout 2024, with 74% of organizations reporting they had been hit within the last year.

 

Who carries out ransomware attacks?

 

The World Cybercrime Index, which compiles cybercrime data from all over the world (including data on ransomware attacks), found that most cyberattacks originate from a small number of countries. Here are the top five, with Russia being the originator of the most cyberattacks.

  1. Russia
  2. Ukraine
  3. North Korea
  4. China
  5. United States
 

These countries top the list due to several factors: they have a highly educated populace, relatively few opportunities to profit (in some cases), and geopolitical significance.

While cyberattacks may be part of an international conflict, most ransomware attacks are carried out by individual criminals using RaaS or organized cybercriminal gangs working independently of state influence. A relatively small number of gangs are responsible for most ransomware attacks.

 

In the healthcare industry, more than half of all ransomware attacks are carried out by one of five ransomware gangs. Of course, there are always new ransomware gangs popping up. By the second quarter of 2024 alone, there were 27 new ransomware groups on the scene.

 

The financial impact of ransomware

 

In 2023, ransomware payments surpassed $1 billion for the first time ever, and the average cost of a ransomware attack is now $4.91 million. Notably, ransomware can have a devastating financial impact on businesses even when they don’t pay up. Meanwhile, the financial impacts of downtime, lost productivity, and reputation damage can be difficult to quantify.

 

Cryptocurrency is by far the most popular payment currency for ransomware attackers, due in part to its greater anonymity. By mid-2024, almost $460 million in ransoms had already been paid in cryptocurrency. 2024 was also a record-breaking year for ransomware payments in general, with the largest ever payment, amounting to about $75 million, paid to the Dark Angels ransomware group.

 

In the 2024 State of Ransomware study, published by ActualTech, researchers found that 29% of queried organizations have a strict no-payment policy for ransomware, which ensures they have a clear procedure to follow if they fall victim. However, there’s still a long way to go, as another 29% of organizations have no ransomware policy at all.

 

Insurance can help mitigate financial losses: in 2023, insurance was used to pay for about one-quarter of the amount demanded for ransom. While insurance is a boon to victims, it does little to address the underlying problems that incentivize ransomware attackers.

 

It’s been shown time and time again that paying the ransom doesn’t pay off. Only one-third of organizations that paid ransom in 2023 got data access fully restored, and 13% of those who paid didn’t get access restored at all and had to retrieve their data another way.

 

Even if data access is fully restored, breached data often ends up on the dark web, where cybercriminals can buy and sell information for future attacks or schemes to commit identity theft.

 

The amount of data available on the dark web is massive. While exact figures are hard to come by, known data leaks help reveal the scale of the problem. In a single data breach of AT&T in 2024, more than 70 million customers’ data appeared on the dark web.

 

Downtime resulting from lost access to valuable data also has financial repercussions. Businesses average 56 hours of downtime following a security incident. In heavy industry, the median cost of downtime averages around $125,000 per hour; thus, 56 hours of downtime would amount to over $7 million in losses per security breach.

 

Ransomware attack methods

 

The most “traditional” ransomware attack method remains the most prevalent; the majority of ransomware attacks businesses observed in 2023 were carried out through data encrypted for ransom, at 55%.

 

However, for many organizations, data encryption attacks are accompanied by other attack vectors too, especially when they fail to invest in proper cybersecurity.

 

Double extortion is another increasingly popular ransomware attack method: ransomware attackers not only encrypt sensitive data, they also exfiltrate (steal it) and threaten to sell or leak the data on the dark web. According to Rapid7 Labs, an average of 24 ransomware groups posted on leak sites per month in the first half of 2023, and the number increased to 40 groups in the same period of 2024 — a roughly 66% increase in ransomware groups posting to data leak sites.

 

Another increasingly common ransomware method is posting the data to leak sites. In 2023, there was a 75% spike in posts to data leak sites compared to 2022. Combined, ransomware attacks that occurred through exploited vulnerabilities and compromised credentials accounted for 65% of attacks in 2023.

 

Some ransomware also gets through to a device directly through phishing emails, but this only accounts for around 5% of cases. Most ransomware attacks are made through stolen credentials obtained on the dark web. Stolen data can be obtained through phishing scams on social media or other communication methods, indirectly connecting phishing to ransomware attacks.

 

Ransomware predictions and prevention

 

Ransomware attacks are expected to become more frequent and financially damaging. By 2031, it’s predicted that a ransomware attack will occur every 2 seconds, which translates to a mind-boggling 43,200 attacks per day. Globally, quantifiable losses attributed to ransomware are estimated to reach $265 billion by 2031.

 

Ransomware attacks are also more likely to be linked to state actors, with governments making use of hackers and RaaS to fund military operations or advance political agendas.

 

Despite the predictions and current prevalence of ransomware, many organizations lack proper preventative strategies against ransomware attacks.

 

Many are woefully unprepared. According to Ransomware.org’s 2024 State of Ransomware report, just under half (48%) of survey respondents felt their organization was ready for a ransomware attack. A similar proportion of organizations (46%) had small incident response teams, of 5 people or less.

 

Many ransomware attacks occur in part due to sensitive data obtained from data breaches. A Ponemon study found that 60% of data breaches occurred due to an unpatched known vulnerability that could have been fixed before the data breach. In the same survey, 52% of respondents said they used manual processes to respond to vulnerabilities, putting them at a disadvantage.

 

AI may change the impact of future vulnerabilities, with AI tools being used for patch management. Microsoft found that using AI allowed the company to predict the vulnerabilities most likely to be exploited within 30 days of their disclosure.

 

End-user employees outside IT departments are often the weakest link in organizations’ defenses. However, cybersecurity training can reduce the risk of cyberattacks from 60% to as low as 10%.

 

Using cybersecurity software, such as antivirus, can help avoid ransomware and other preventable online threats.

 

Help defend against ransomware attacks

 

Ransomware attacks aren’t going away. New threats are constantly appearing and evolving, and it’s up to you to stay one step ahead of attackers.

 

Norton 360 Deluxe can help you stay on top of evolving threats and keep your data safer. In addition to protection against ransomware, viruses, and other malware, Norton 360 Deluxe helps block fake websites that attempt to steal your passwords. It also comes with a secure VPN so you can browse the internet more privately. Get award-winning cyberdefenses to help secure your digital life.

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1482
Top 5 social media scams https://www.antivirus-la.com/en/top-5-social-media-scams/ Fri, 21 Mar 2025 15:42:26 +0000 https://www.antivirus-la.com/?p=1449

Top 5 social media scams

Los sitios de redes sociales como Twitter y Facebook tienen un lado oscuro. Las solicitudes de phishing son una táctica común de los ciberdelincuentes. Tenga cuidado de no hacer clic a ciegas en URL acortadas. Compruebe su protección antivirus y anti-spyware.

We’re wired to be social creatures, and sites like Twitter and Facebook have capitalized on this to great success. According to its COO Sheryl Sandberg, Facebook draws 175 million logins every day.

 

But with this tremendous popularity comes a dark side as well. Virus writers and other cybercriminals go where the numbers are — and that includes popular social media sites. To help you avoid a con or viral infection, we’ve put together this list of the top five social media scams.

 

5. Chain Letters

 

You’ve likely seen this one before — the dreaded chain letter has returned. It may appear in the form of, “Retweet this and Bill Gates will donate $5 million to charity!” But hold on, let’s think about this. Bill Gates already does a lot for charity. Why would he wait for something like this to take action? Answer: He wouldn’t. Both the cause and claim are fake.

 

 

So why would someone post this? Good question. It could be some prankster looking for a laugh, or a spammer needing “friends” to hit up later. Many well-meaning people pass these fake claims onto others. Break the chain and inform them of the likely ruse.

 

4. Cash Grabs

 

By their very nature, social media sites make it easy for us to stay in touch with friends, while reaching out to meet new ones. But how well do you really know these new acquaintances? That person with the attractive profile picture who just friended you — and suddenly needs money — is probably some cybercriminal looking for easy cash. Think twice before acting. In fact, the same advice applies even if you know the person.

 

Picture this: You just received an urgent request from one of your real friends who “lost his wallet on vacation and needs some cash to get home.” So, being the helpful person you are, you send some money right away, per his instructions. But there’s a problem: Your friend never sent this request. In fact, he isn’t even aware of it. His malware-infected computer grabbed all of his contacts and forwarded the bogus email to everyone, waiting to see who would bite.

 

Again, think before acting. Call your friend. Inform him of the request and see if it’s true. Next, make sure your computer isn’t infected as well.

 

3. Hidden Charges

 

“What type of STAR WARS character are you? Find out with our quiz! All of your friends have taken it!” Hmm, this sounds interesting, so you enter your info and cell number, as instructed. After a few minutes, a text turns up. It turns out you’re more Yoda than Darth Vader. Well, that’s interesting … but not as much as your next month’s cell bill will be.

 

You’ve also just unwittingly subscribed to some dubious service that charges $9.95 every month.

 

As it turns out, that “free, fun service” is neither. Be wary of these bait-and-switch games. They tend to thrive on social sites.

 

2. Phishing Requests

 

“Somebody just put up these pictures of you drunk at this wild party! Check ’em out here!” Huh? Let me see that! Immediately, you click on the enclosed link, which takes you to your Twitter or Facebook login page. There, you enter your account info — and a cybercriminal now has your password, along with total control of your account.

 

How did this happen? Both the email and landing page were fake. That link you clicked took you to a page that only looked like your intended social site. It’s called phishing, and you’ve just been had. To prevent this, make sure your Internet security includes antiphishing defenses. Many freeware and shareware programs don’t include this essential protection.

 

1. Hidden URLs

 

Beware of blindly clicking on shortened URLs. You’ll see them everywhere on Twitter, but you never know where you’re going to go since the URL (“Uniform Resource Locator,” the Web address) hides the full location. Clicking on such a link could direct you to your intended site, or one that installs all sorts of malware on your computer.

 

URL shorteners can be quite useful. Just be aware of their potential pitfalls and make sure you have real-time protection against spyware and viruses.

 

Bottom line: Sites that attract a significant number of visitors are going to lure in a criminal element, too. If you take security precautions ahead of time, such as using antivirus and anti-spyware protection, you can defend yourself against these dangers and surf with confidence.

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1449
AI for good — Using AI to help protect against scams https://www.antivirus-la.com/en/ai-for-good-using-ai-to-help-protect-against-scams-2/ Wed, 19 Mar 2025 15:06:07 +0000 https://www.antivirus-la.com/?p=1421

AI for good — Using AI to help protect against scams

Scams are getting more difficult to detect, but we’ve prepared for it. Today, Norton is taking a groundbreaking leap with integrating Genie Scam Protection — our latest innovation in AI-powered scam detection and cybersecurity — into the Norton Cyber Safety lineup.

You might get one while you’re out at dinner … or while you’re on the couch as you’re enjoying a book. You could even receive one during your vacation in a faraway place. Ping! That familiar sound announces a text message. 

 

At first glance, the message looks legitimate. You’re about to click away like usual. But suddenly, you’re just not quite sure if you should click on that link after all.

 

Is that a real alert from your bank? Has your account really been compromised? It would be ideal to have a friend who’s an expert on scams to look over your shoulder. They could instantly tell you if your suspicions are correct or if you don’t need to worry. Enter Norton.

 

Building on the success of our original Norton Genie scam-detection app, Norton Genie Scam Protection, our new feature across the Norton 360 plans, utilizes our advanced proprietary artificial intelligence (AI) to instantly expose online scams, so you can relax and get back to your meal, your book, or your vacation. 


An AI solution designed to work with real-world problems

The inspiration behind the original Genie app stems from the understanding that cyberattackers have evolved their tactics. It’s not just about targeting systems— it’s about connecting with and exploiting people. 

 

“Today’s scams are not the scams you’ve outwitted before,” said Leena Elias, Chief Product Officer at Gen. “Gone are the days when you could spot a scam a mile away with the naked eye. Scammers are tapping into AI to speed up their schemes and make them more believable. Couple that with the sheer volume of emails, texts, and calls we’re getting every day; it’s clear we need technology on our side to help us avoid becoming the next scam victim.”

 

Our original Genie app detects scams by scanning text and images to identify modern, hard-to-spot scams. Not only does it analyze text and links but also looks for subtle emotional and contextual cues within messages to identify advanced scams. It empowers users to stay safe in an increasingly connected and complex world. 

 

But we asked ourselves: how could we get more of Genie to more people? We used the learnings gathered by the original Genie app to create Genie Scam Protection, a part of the Norton 360 mobile and desktop app experiences. This expansion will help keep users Cyber Safe from more types of scams without needing to use a second app. 

 

Seamless integration across Norton Cyber Safety products

Genie Scam Protection is embedded into the Norton Cyber Safety lineup at no additional cost. This expansion adds new layers of protection to help keep you safer from online scams. 

 

Features include: 

  • Safe SMS: Alerts users to suspicious texts, ideal for mobile-first scam detection using Genie’s tech. 
  • Safe Web: Identifies risky websites during online browsing and shopping. 
  • Genie AI-powered scam assistant: Get real-time feedback on scams and suspicious offers with a single tap. You can also ask it if a question if you feel something’s … strange. 
  • Genie dashboard: It will show useful stats, like how many scams Genie has detected. 
 

However, for Norton 360 with LifeLock Select, Advantage, and Ultimate Plus plans, we’ve added Genie Scam Protection Pro, which includes the features above, and adds: 

  • Safe Call: Blocks fraudulent calls or labels incoming calls so people can decide whether to answer or block. 
  • Safe Email: Proactively flags suspicious patterns in email communications before you even open them, using Genie’s tech. 
 

For Norton 360 with LifeLock Ultimate Plus users, Genie Scam Protection Pro goes even further, including Scam Support and Reimbursement that provides up to $10,000 in coverage for certain types of scams. 

 

A look behind the tech

Many scam checking tools rely on their ability to analyze a web link. A link known to be dangerous is blocked, and the user is protected. But, when messages don’t contain links, or the links are unknown, they can slip through security tools unhindered. 

 

Genie’s AI engine doesn’t just rely on links and known bad websites. It analyzes the contextual elements of the message, looking at what the words mean in the same way a human would — and a scam expert at that. 

 

Genie combines its text analysis with our in-depth understanding of Cyber Safety. The comprehensive analysis allows Genie to provide timely warnings to users, even for previously unseen scams

 

Even if these scams are designed to fool you and other security tools without known bad links, or without links at all, Genie Scam Protection can detect scam threats from a mile away. This happens proactively, in real-time, without your needing to lift a finger to find out if that text, email, or website is a scam. And if you find something suspicious online, you can always seek advice from the Genie AI-powered assistant feature whenever you feel like something isn’t quite right. 

 

Moving forward to help keep you Cyber Safe

It’s not just about defending against threats — it’s about empowering users to make informed decisions and enhancing their digital independence and safety. The Norton Cyber Safety lineup, now with Genie Scam Protection, represents more than just a technological advancement — it’s a tectonic shift in how people manage their personal cybersecurity and interact with AI. With it, Norton keeps paving the way into a new era of AI-powered cybersecurity. 

Read More

Uncategorized

How to create a secure password

How to create a secure password People lose money to account takeovers every year—but you don’t have to. Instead of using simple passwords and reusing

Read More »
]]>
1421
AI for good — Using AI to help protect against scams https://www.antivirus-la.com/en/ai-for-good-using-ai-to-help-protect-against-scams/ Wed, 05 Mar 2025 16:08:19 +0000 https://www.antivirus-la.com/?p=1391

AI for good — Using AI to help protect against scams

Scams are getting more difficult to detect, but we’ve prepared for it. Today, Norton is taking a groundbreaking leap with integrating Genie Scam Protection — our latest innovation in AI-powered scam detection and cybersecurity — into the Norton Cyber Safety lineup.

norton

You might get one while you’re out at dinner … or while you’re on the couch as you’re enjoying a book. You could even receive one during your vacation in a faraway place. Ping! That familiar sound announces a text message. 

At first glance, the message looks legitimate. You’re about to click away like usual. But suddenly, you’re just not quite sure if you should click on that link after all.

Is that a real alert from your bank? Has your account really been compromised? It would be ideal to have a friend who’s an expert on scams to look over your shoulder. They could instantly tell you if your suspicions are correct or if you don’t need to worry. Enter Norton.

Building on the success of our original Norton Genie scam-detection app, Norton Genie Scam Protection, our new feature across the Norton 360 plans, utilizes our advanced proprietary artificial intelligence (AI) to instantly expose online scams, so you can relax and get back to your meal, your book, or your vacation. 

An AI solution designed to work with real-world problems

The inspiration behind the original Genie app stems from the understanding that cyberattackers have evolved their tactics. It’s not just about targeting systems— it’s about connecting with and exploiting people. 

“Today’s scams are not the scams you’ve outwitted before,” said Leena Elias, Chief Product Officer at Gen. “Gone are the days when you could spot a scam a mile away with the naked eye. Scammers are tapping into AI to speed up their schemes and make them more believable. Couple that with the sheer volume of emails, texts, and calls we’re getting every day; it’s clear we need technology on our side to help us avoid becoming the next scam victim.”

Our original Genie app detects scams by scanning text and images to identify modern, hard-to-spot scams. Not only does it analyze text and links but also looks for subtle emotional and contextual cues within messages to identify advanced scams. It empowers users to stay safe in an increasingly connected and complex world. 

But we asked ourselves: how could we get more of Genie to more people? We used the learnings gathered by the original Genie app to create Genie Scam Protection, a part of the Norton 360 mobile and desktop app experiences. This expansion will help keep users Cyber Safe from more types of scams without needing to use a second app. 

Seamless integration across Norton Cyber Safety products

Genie Scam Protection is embedded into the Norton Cyber Safety lineup at no additional cost. This expansion adds new layers of protection to help keep you safer from online scams. 

Features include: 

  • Safe SMS: Alerts users to suspicious texts, ideal for mobile-first scam detection using Genie’s tech. 
  • Safe Web: Identifies risky websites during online browsing and shopping. 
  • Genie AI-powered scam assistant: Get real-time feedback on scams and suspicious offers with a single tap. You can also ask it if a question if you feel something’s … strange. 
  • Genie dashboard: It will show useful stats, like how many scams Genie has detected. 
 

However, for Norton 360 with LifeLock Select, Advantage, and Ultimate Plus plans, we’ve added Genie Scam Protection Pro, which includes the features above, and adds: 

  • Safe Call: Blocks fraudulent calls or labels incoming calls so people can decide whether to answer or block. 
  • Safe Email: Proactively flags suspicious patterns in email communications before you even open them, using Genie’s tech. 
 

For Norton 360 with LifeLock Ultimate Plus users, Genie Scam Protection Pro goes even further, including Scam Support and Reimbursement that provides up to $10,000 in coverage for certain types of scams. 

A look behind the tech

Many scam checking tools rely on their ability to analyze a web link. A link known to be dangerous is blocked, and the user is protected. But, when messages don’t contain links, or the links are unknown, they can slip through security tools unhindered. 

Genie’s AI engine doesn’t just rely on links and known bad websites. It analyzes the contextual elements of the message, looking at what the words mean in the same way a human would — and a scam expert at that. 

Genie combines its text analysis with our in-depth understanding of Cyber Safety. The comprehensive analysis allows Genie to provide timely warnings to users, even for previously unseen scams

Even if these scams are designed to fool you and other security tools without known bad links, or without links at all, Genie Scam Protection can detect scam threats from a mile away. This happens proactively, in real-time, without your needing to lift a finger to find out if that text, email, or website is a scam. And if you find something suspicious online, you can always seek advice from the Genie AI-powered assistant feature whenever you feel like something isn’t quite right. 

Moving forward to help keep you Cyber Safe

It’s not just about defending against threats — it’s about empowering users to make informed decisions and enhancing their digital independence and safety. The Norton Cyber Safety lineup, now with Genie Scam Protection, represents more than just a technological advancement — it’s a tectonic shift in how people manage their personal cybersecurity and interact with AI. With it, Norton keeps paving the way into a new era of AI-powered cybersecurity. 

 

Disclaimer: Some new scam protection features will be gradually rolled out to existing Norton customers.

]]>
1391
Is TikTok safe? 3 TikTok scams to be aware of https://www.antivirus-la.com/en/3-tiktok-scams-to-be-aware-of/ Mon, 20 Jan 2025 21:07:37 +0000 https://www.antivirus-la.com/?p=1311

Is TikTok safe? 3 TikTok scams to be aware of

TikTok is a generally safe social media app—with several key caveats. You might have heard about TikTok scams like fake giveaways, phishing attacks, and romance scams. Learn how safe this popular app is and how a product like Norton 360 Deluxe can help cover some of its weak spots.

TikTok Norton

What is TikTok?

TikTok is a short video hosting platform developed by the Beijing-based media company ByteDance. Despite its popularity, TikTok has been at the center of a few controversies over the years, with parents, businesses, and lawmakers expressing concerns about the app’s security and trustworthiness.

Data collection, harmful content, and national security are some of the app’s most contentious areas. So, is TikTok safe to use? And are any age groups more vulnerable than others? We’ll explore several of the app’s biggest security threats to shed light on these questions.

How safe is TikTok?

Generally speaking, TikTok is as safe as any other social media platform thanks to the app’s many security features, including:

  • Two-factor authentication (2FA)
  • Comment filters and curated content for children below the age of 13
  • Users between the ages of 13 and 15 are given private accounts by default
  • A 60-minute time limit for users below the age of 18
  • Only users who are 18 and older can complete transactions with virtual gifts
 

But TikTok still faces scrutiny. A 2023 survey  found that 59% of American adults consider TikTok to be a major or minor threat to the United States’ national security, due in part to the app’s data collection practices.

Furthermore, international governments have flagged TikTok as a security risk and issued bans on the app. Australia, Estonia, France, Norway, the UK, the US, and several institutions of the European Union prohibited employees from installing TikTok on government-owned devices. These nations cited concerns over TikTok’s data collection practices as primary motivators for this ban.

What types of data does TikTok collect?

Like many other apps, TikTok collects data to improve the app’s functionality and user experience, including:

  • Account information: Your name, username, profile picture, email, phone number, and passwords are all collected by the app.
  • Cookies/behavioral data: The app uses cookies that can track your activities to gain a better sense of your interests. TikTok observes the videos you watch, how long you watch them, and which ones you save.
  • Device data: TikTok takes notice of the devices you use to access the app, and can distinguish them based on their operating systems and network carriers.
  • Location information: TikTok can register things like IP addresses and GPS data to determine a user’s location.
  • User-created content: TikTok logs every post, video, and comment its users engage with. This includes content users create as well as content they view from other accounts.
 

User data is essential to helping apps work properly. It can also be shared with different organizations for various reasons.

 

Who does TikTok share data with?

TikTok shares data with multiple organizations for business and regulatory purposes. Some entities that have access to TikTok’s data include:

  • Advertisers: TikTok shares user data with advertisers to create targeted ads and better understand user activity.
  • Businesses: TikTok shares data with other social media businesses to learn more about user activities on other apps.
  • Governments and police agencies: Law enforcement agencies and federal agencies can request user data from TikTok to assist with investigations or to comply with government mandates. This can also happen when Congressional hearings occur.
  • Third-party apps: TikTok shares user data with third-party apps—aka apps that ByteDance doesn’t own. This correlates with TikTok’s Jump program, which lets users access third-party integrations from companies like Wikipedia and Quizlet to create content.
 

TikTok publishes reports on its data-sharing agreements, which can help users understand how the company handles their information. But scams can occur if user data falls into the wrong hands. 

TikTok scams

TikTok faces many of the same social media threats that impact Facebook, Instagram, and Twitter.

Romance scams

Romance scams prey on individuals seeking a romantic relationship online. In a TikTok romance scam, a bad actor creates a fake account and targets real users by speaking to them in comment sections or directly messaging them. The scammer may build trust over time, and then craft elaborate stories to ask for money. Feeling pressured to send money and struggling to speak to the other person (in person or over the phone) may be signs of a romance scam.

Fake giveaways

Community engagement is a major part of the TikTok experience. Scammers can try to capitalize on this by holding fake giveaways for nonexistent prizes. The severity of these fake giveaways can vary; some accounts might hold fake giveaways to drive engagement, while more nefarious individuals will attempt to steal money or personal information.

Phishing scams

In a phishing scam, a criminal will try to gain access to sensitive information by posing as a legitimate source. On the TikTok app, a scammer might try to phish information by directly messaging a user and asking for details like login credentials or credit card info. TikTok users might even encounter comments or posts that urge them to click on a specific link, which can kick-start a phishing scam.

 

Bad actors, hackers, and criminals can use TikTok to commit various social media scams, but users can use cybersecurity tips to boost their safety on the app.

Cybersecurity tips for TikTok

Cybersecurity best practices and basic digital hygiene can make your time on TikTok much safer. Helpful strategies include:

  • Don’t share private information: Social media apps can pave the way for conversations, but you might not always know who you’re talking to. Exercise caution when sharing details about yourself, and never share sensitive info like Social Security numbers or even your home address.
  • Perform a social media cleanup: Cybercriminals can exploit vulnerabilities in your social media accounts if you aren’t careful. Perform a social media cleanup by deleting old accounts you no longer use, making active accounts private, and updating your passwords.
  • Use cybersecurity tools: Cybersecurity tools can serve as a line of defense against various TikTok scams. A password manager can help you maintain more control over your accounts, while antivirus software can help protect your device from malware.
 

TikTok may not be the only social media platform you regularly use. Thankfully, you can implement these strategies on other social media platforms to protect your online presence more effectively.

 Use TikTok safely with Norton 360 Deluxe
 

You can take steps to help manage some of TikTok’s cybersecurity risks. Services like Norton 360 Deluxe provide a suite of cybersecurity tools to help you stay safer while you’re on and off the app, including a built-in VPN and a dark web monitoring solution.

 

Read More

]]>
1311
How does Spotify Wrapped work and what data do they collect? https://www.antivirus-la.com/en/how-does-spotify-wrapped-work/ Fri, 10 Jan 2025 18:00:40 +0000 https://www.antivirus-la.com/?p=979

How does Spotify Wrapped work and what data do they collect?

Spotify Wrapped is here! Social media feeds have lit up with colorful, shareable snapshots of users’ yearly music habits. Let’s uncover the technology behind the magic and explore the implications for your data privacy.

 
 

Spotify Wrapped has become a cultural phenomenon. Whether it’s showcasing your most-played artists or curating your personal soundtrack for the year, we all want to know our results. Plus, this year there are some other cool features to explore, like Your Music Evolution. 

But how does it all come together, and what does Spotify learn about you in the process? Let’s dive into how Spotify Wrapped works and what it means for your data privacy.

What is Spotify Wrapped?

Spotify Wrapped is an annual feature that uses your listening data to generate a personalized recap of your music habits over the year. Launched in 2015, Wrapped has become more than just a feature—it’s a social media staple. Users can easily share their top artists, favorite songs, and total listening time, sparking discussions and playlists among friends.

Last year, over 227 million users worldwide engaged with Spotify Wrapped. Its viral success is no accident—Spotify uses complex algorithms and data science to craft these summaries.

How Spotify collects and uses your usage data

 

Spotify collects vast amounts of data about how you interact with to create Wrapped. From songs you listen to and playlists you make to the device you use, all of it’s part of this intricate puzzle. Here’s a breakdown of the key data points Spotify gathers:

  • Your listening habits: Spotify tracks what you listen to, how often, and for how long.
  • Device and activity data: It also monitors the device you use, the time of day you listen, and your activity during streaming sessions.
  • Behavioral trends: Your skips, replays, and even the genres you gravitate to during specific seasons are all logged.
 

This effort to collect so much specific data isn’t just for fun. Spotify uses it year-round to recommend playlists, refine its algorithm, and, of course, power Wrapped.

 The science behind Spotify Wrapped
 

Based on tech commentators’ observations, it’s likely that Spotify Wrapped relies on three core technologies to analyze and present your listening data. Check out what it takes to craft their insights:

 User taste profiles

Spotify uses collaborative filtering to group listeners with similar tastes. For example, if you love indie rock, you’re grouped with other indie rock fans. Spotify then cross-references what others in your “group” are listening to, using that data to improve recommendations and paint an accurate picture of your preferences.

 Audio modeling
 

Audio modeling dives deeper into the characteristics of each song. This includes factors like tempo, beat, instrumentation, and even lyrical analysis using natural language processing (NLP). By combining this data with your listening habits, Spotify refines its recommendations to reflect not just what you listen to but the specific elements of music you gravitate toward.

Data activation

Finally, Spotify transforms all this data into a curated experience. Whether it’s Discover Weekly playlists or the Wrapped slideshow, Spotify turns raw data into moments of delight for its users.

 Does Spotify know too much?
 

Spotify’s data collection has undeniable perks, like personalized recommendations and curated playlists. Some critics argue that this level of data aggregation ventures too far by tracking intimate details of users’ lives, while others are completely okay with it.

Understanding what the platform collects—and how to manage your privacy—is essential. Using Spotify’s private session feature can limit data collection for specific listening activities. Similarly, understanding when data collection for each Spotify Wrapped period stops—usually in late October to mid-November—can help you anticipate how your habits count toward your summary. Just keep in mind that Spotify collects data year-round for their other features.
 
Whether you’re partaking in this social media trend or not, it’s important to stay informed. Be safe out there!
]]>
979