article thumbnail

MY TAKE: What NortonLifeLock’s $8 billion buyout of Avast portends for consumer security

The Last Watchdog

This deal reads like to the epilogue to a book titled The First 20 Years of the Supremely Lucrative Antivirus Market. Way back in 1990, Symantec acquired Norton Utilities and made Norton the heart of its antivirus subscription offering. Related: The coming of ubiquitous passwordless access. billion in 2016, for instance.

Antivirus 223
article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. In 2017, the identity theft protection company LifeLock was acquired by Symantec Corp. ” Norton 360 is owned by Tempe, Ariz.-based based NortonLifeLock Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve written this countless times: keep your antivirus updated, click judiciously, practice good password hygiene. The top B2C VPNs proved to be very clever and effective at differentiating themselves from one another and very successful at marketing their services. Related: Privacy war: Apple vs. Facebook. percent ten years ago.

B2C 214
article thumbnail

How to Avoid Fake QR Code Scams

Identity IQ

They can sell your information on the black market, use it to commit identity theft, or even access your online accounts and steal your money. For the best protection, consider IdentityIQ identity theft protection and credit monitoring services. Remember, your vigilance is your best shield against these threats.

Scams 103
article thumbnail

The Revival of Raccoon Stealer

Approachable Cyber Threats

The booming market on the Dark Web for passwords and other personal information make it a lucrative business for any cybercriminal - and Raccoon Stealer’s Malware-as-a-Service model makes it even easier for anyone to steal your information to make a profit. as they continue to make improvements. How can I protect myself from Raccoon Stealer?”

article thumbnail

Data Breach: Millions of Phone Numbers, Recordings, and Call Logs Compromised in Ringostat Data Leak

Security Affairs

Ringostat is an Eastern European company specializing in call-tracking, analytics, and other marketing aids for smartphones. Identity Theft: Leaked personally identifiable information (PIIs) can be used to access accounts on other websites, leading to further information leaks and outright identity theft.

article thumbnail

Romanian duo convicted of fraud Scheme infecting 400,000 computers

Security Affairs

The crooks used malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS to spread the malware. The malware was developed to steal credentials, financial data, personal information, then the crooks offered them on the dark web marketplaces.