Norton.com
> Viruses & Risks
Viruses & Risks
Our security research centers around the world provide unparalleled analysis of and protection from malware, security risks, vulnerabilities, and spam. If you have any thoughts for how we can improve the content on these pages, please take a moment to provide some
Threat Spotlight: Trojan.Ransomlock
Videos: Tweeting Misleading Apps
Most Active New Threats
W32.Narilam | Worm | 15/11/2012 |
Trojan.Ransomlock!g26 | Trojan | 15/11/2012 |
Trojan.Zbot!gen37 | Trojan | 13/11/2012 |
Packed.Generic.393 | Trojan | 12/11/2012 |
Downloader.Ponik | Trojan | 09/11/2012 |
Trojan.Ransomlock!g21 | Trojan | 07/11/2012 |
Trojan.FakeAV!gen95 | Trojan | 06/11/2012 |
SecShieldFraud!gen10 | Misleading Application | 06/11/2012 |
Packed.Generic.392 | Trojan | 05/11/2012 |
Trojan.Ransomlock!g20 | Trojan | 04/11/2012 |
View all Threats
View all Risks
Internet Threat Meter
Download to your desktop
Security Response Blog
W32.Narilam – Business Database Sabotage
Symantec Security Response @
Thu, 22 Nov 2012 10:39:05
In the last couple of years, we have seen highly sophisticated malware used to sabotage the ...
Malware Targeting Windows 8 Uses Google Docs
Takashi Katsuki @
Fri, 16 Nov 2012 22:55:39
read more ...
Thanksgiving & Black Friday On Spammers’ Radar
Anand Muralidharan @
Thu, 15 Nov 2012 13:22:37
Some events familiar among people in the United States are commencing this month, including: Thanksgiving—a great ...
Instagram Spam Leads to Premium Mobile Services
Ben Nahorney @
Wed, 14 Nov 2012 16:04:40
Spammers have long been leveraging social networking sites to pull off scams. Generally speaking, as the ...
Windows 8 Not Immune to Ransomware
Symantec Security Response @
Tue, 13 Nov 2012 21:49:39
Cybercriminals have for some time now recognized that ransomware can be a highly profitable endeavor. This ...
Christmas Would Not Text You That Early
Candid Wueest @
Tue, 13 Nov 2012 21:39:34
Even with mobile phones now being an essential part of our lives, I am still not ...
Threat Spotlight: Trojan.Ransomlock
Trojan.Ransomlock is a detection for Trojan horse programs that lock the desktop of a compromised computer making it unusable.
The threat may arrive on the compromised computer by various means, such as visiting malicious sites, by opening untrusted links or advertisement banners, or by installing software from untrusted sources.
These programs attempt to convince the user to pay money in order to have their computer unlocked and use a variety of different techniques in order to encourage the user to pay the ransom.
More information on Trojan.Ransomlock is available in the Trojan.Ransomlock writeup.
How They Attack
Over the last 18 months, an ominous change has swept across the Internet. The tools driving the new attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.
What is Cybercrime?
How does cybercrime affect people? Check out these real-world examples. To avoid becoming a victim of cybercrime, learn the basics of online protection.
HOW TO PROTECT
Secure Your Email
Browse the Web Safely
Safeguard Your Instant Messenger
File Sharing Protection
HOW THEY ATTACK
Vulnerabilities
Spyware
Spam
Phishing
Malware
Cybercrime
TOOLS & RESOURCES
Threat Explorer
24x7 Protection with Norton Products
Virus Definitions & Security Updates
Virus & Threat Removal Tools
Norton Report
Internet Threat Meter on Your Desktop
Glossary