Norton.com
> Viruses & Risks
Viruses & Risks
Our security research centers around the world provide unparalleled analysis of and protection from malware, security risks, vulnerabilities, and spam. If you have any thoughts for how we can improve the content on these pages, please take a moment to provide some .
Threat Spotlight: Trojan.Clampi
Videos: Tweeting Misleading Apps
Most Active New Threats
The current most active new threats
Trojan.Ransomlock!g28 | Trojan | 22/11/2012 |
W32.Narilam | Worm | 15/11/2012 |
Trojan.Ransomlock!g26 | Trojan | 15/11/2012 |
Trojan.Zbot!gen37 | Trojan | 13/11/2012 |
Packed.Generic.393 | Trojan | 12/11/2012 |
Downloader.Ponik | Trojan | 09/11/2012 |
Trojan.Ransomlock!g21 | Trojan | 07/11/2012 |
Trojan.FakeAV!gen95 | Trojan | 06/11/2012 |
SecShieldFraud!gen10 | Misleading Application | 06/11/2012 |
Packed.Generic.392 | Trojan | 05/11/2012 |
View all Threats
View all Risks
Internet Threat Meter
The current risk level associated with common online activities
Most users typically encounter malicious threats as they use their computer to engage in online activities. Symantec is constantly monitoring the threat landscape where our users are likely to spend most of their time online.
The Internet Threat Meter provides a quick visual indicator of how likely each common online activities is likely to encounter some form of threat from a malicious attacker.
- Hover over each activity for a short explanation of the current risk level
- Click on an activity to visit a page with more detail on that activity and the risk level
Internet Threat Meter
Download to your desktop
Security Response Blog
W32.Narilam – Business Database Sabotage
Symantec Security Response @
Thu, 22 Nov 2012 10:39:05
In the last couple of years, we have seen highly sophisticated malware used to sabotage the ...
Malware Targeting Windows 8 Uses Google Docs
Takashi Katsuki @
Fri, 16 Nov 2012 22:55:39
read more ...
Thanksgiving & Black Friday On Spammers’ Radar
Anand Muralidharan @
Thu, 15 Nov 2012 13:22:37
Some events familiar among people in the United States are commencing this month, including: Thanksgiving—a great ...
Instagram Spam Leads to Premium Mobile Services
Ben Nahorney @
Wed, 14 Nov 2012 16:04:40
Spammers have long been leveraging social networking sites to pull off scams. Generally speaking, as the ...
Windows 8 Not Immune to Ransomware
Symantec Security Response @
Tue, 13 Nov 2012 21:49:39
Cybercriminals have for some time now recognized that ransomware can be a highly profitable endeavor. This ...
Christmas Would Not Text You That Early
Candid Wueest @
Tue, 13 Nov 2012 21:39:34
Even with mobile phones now being an essential part of our lives, I am still not ...
Threat Spotlight
Trojan.Clampi is a Trojan horse that attempts to steal login credentials related to online banking and other financially related websites. The threat is typically installed by way of drive-by download and once it compromises a computer, it downloads several modules. One of these modules is used to spread Clampi through network shares.
Trojan.Clampi is able to bypass firewalls to relay the stolen information to a remote attacker and also uses a SOCKS proxy to allow the remote attacker to then login to banking and other financially related websites anonymously with the stolen credentials.
More information on Trojan.Clampi is available in the threat family writeup.
Videos
Security Response clips about malware and its effects
What is Cybercrime?
How does cybercrime affect people? Check out these real-world examples. To avoid becoming a victim of cybercrime, learn the basics of online protection.
Cybercrime Stories
Are you like Sandra E?
- never had a virus
- shop in store not online
- Use popular search engines
Read how you could become a cybercrime victim
How To Protect
Secure Your Email
Browse the Web Safely
Safeguard Your Instant Messenger
File Sharing Protection
How They Attack
Vulnerabilities
Spyware
Spam
Phishing
Malware
Cybercrime
Norton Home Page Assistance
Tools & Resources
Threat Explorer
Virus Definitions & Security Updates
Virus & Threat Removal Tools
Home & Home Office Security Report
Internet Threat Meter on Your Desktop
Glossary