Antivirus

Norton AntiVirus Plus: what is it and what’s included?

Norton is well known as one of the top antivirus brands available, with a wide range of products and services to suit differing needs and budgets. In this article, we’ll go over the many features of Norton’s entry-level antivirus package, Norton AntiVirus Plus, including what devices it can be used on.We’ll also look at how…

Norton is well known as one of the top antivirus brands available, with a wide range of products and services to suit differing needs and budgets. In this article, we’ll go over the many features of Norton’s entry-level antivirus package, Norton AntiVirus Plus, including what devices it can be used on.

We’ll also look at how Norton AntiVirus Plus compares to the company’s other internet security suites to help you decide which security solution is right for you. 

  • Discover more about AntiVirus Plus by heading to the Norton website
Get the best price on your preferred Norton package
Norton
at


What is Norton AntiVirus Plus?

Norton AntiVirus Plus is the most basic of Norton’s antivirus offerings. The Norton 360 suite comes with more bells and whistles, such as access to a VPN, dark web monitoring and the ability to block unauthorized webcam access on a PC. Norton 360 Deluxe enables users to protect up to five devices, while Norton 360 with LifeLock Select adds increased identity theft protection, such as credit monitoring.

As the most basic Norton security option, Norton AntiVirus Plus is also the most affordable – about half the cost of Norton 360 Deluxe.

Our dedicated guide on Norton plans will help you choose between the three.

What devices can I use Norton AntiVirus Plus on?

Norton Antivirus Plus can be used on a Mac or PC, but it only provides support to one computer. If you’re looking to protect multiple computers in a household, you’ll need to purchase a Norton AntiVirus Plus license for each individually or, much more sensibly, upgrade to Norton 360 Deluxe. 

Norton AntiVirus Plus is not compatible with smartphones or tablets. 

Norton AntiVirus Plus Interface

(Image credit: Symantec)

Norton AntiVirus Plus: what features does it have?

Norton AntiVirus Plus comes with the standard features of an entry-level antivirus package, as well as quite a few extras:

Antivirus scanning

Norton AntiVirus Plus enables you to scan your computer for malware, spyware, ransomware, and viruses. It offers a Quick Scan option or a comprehensive Full System Scan, as well as the ability to scan custom locations to find and remove threats.

Online protection

Norton AntiVirus Plus detects and blocks malicious URLs, keeping you secure when browsing online. While Norton’s Safe Web browser extension is available for free, Norton AntiVirus Plus will also protect you from malicious links system-wide, such as in PDFs.

Smart firewall

Norton AntiVirus Plus’s Smart Firewall feature helps prevent unwanted access to your files by alerting you whenever a suspicious program is attempting to connect to the internet.

Password manager

Re-using the same weak passwords can pose a huge security risk. Norton AntiVirus Plus offers a password manager that enables you to create unique, strong passwords for each of your accounts without having to remember them all.

Cloud backup

Norton AntiVirus Plus comes with 2GB of cloud storage to back up important files in case of a ransomware attack. You can schedule backups to the cloud to run automatically, or you can manually run a backup whenever you please. You can also choose the files and folders that are backed up. 2GB isn’t much storage, but the feature also enables you to back up files to a local drive.

Virus protection promise

If your device does become infected with a virus while running Norton AntiVirus Plus, you may be eligible for a refund.

How good is Norton AntiVirus Plus?

Norton AntiVirus Plus is a solid choice for anyone looking to secure their computer and easily earns its place among our top rated Windows 10 antivirus programmes.

Even though Norton AntiVirus Plus is the least advanced of Norton’s offerings, it comes with plenty of extra features, like the Smart Firewall and the ability to back up files to the cloud or a local drive. And as the cheapest Norton plan, it’s good value.

However, all those features make the Norton AntiVirus Plus interface a bit confusing to navigate. It might take some adjustment before you are able to easily find the features you’re looking for.

In ou

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Gamers at risk as scammers are using malware-infected cheats and mods to steal passwords and crypto — here’s how to stay safe

Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data Verified crypto wallets like MetaMask and Exodus are being drained through browser injection Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing


  • Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data
  • Verified crypto wallets like MetaMask and Exodus are being drained through browser injection
  • Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions

Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing themselves to sophisticated malware, experts have warned.

Recent findings from Dr.Web revealed a malware family known as “Trojan.Scavenger” which targets Windows users by disguising itself as cheats or enhancements for popular games.

This seemingly harmless mod can ultimately compromise crypto wallets, password managers, and web browsers, posing serious risks to user privacy and digital assets.

You may like

  • GTA VI personages Experts warn GTA and Minecraft being used to lure in cyberattack victims – here’s how to stay safe
  • Best cheap game server hosts appeals to Minecraft users Minecraft players watch out – these fake mods are hiding password-stealing malware
  • Malware Criminals are using a dangerous fake free VPN to spread malware via GitHub – here’s how to stay safe

When cheats become covert threats

The infection chain begins when users download ZIP archives claiming to improve performance in games including the likes of Grand Theft Auto 5 or Oblivion Remastered.

These archives contain modified dynamic libraries, sometimes renamed with extensions like .ASI to resemble legitimate plugin formats.

When the user follows the installation instructions, the malicious library is placed in the same folder as the target game. If the game does not properly validate its libraries, the trojan loads automatically at startup.

In some cases, flaws in library search priorities are essential to the malware’s success, allowing it to hijack execution within the host application.

Once loaded, the malware establishes contact with a command-and-control server using encrypted communication. This process includes verifying encryption keys and checking timestamp consistency, which is meant to evade analysis and block antivirus detection.

The malware doesn’t stop with the initial payload. In more complex infections, it deploys additional trojans that embed themselves in Chromium-based browsers like Chrome, Edge, Opera, and Yandex.

These troj

Read More

Continue Reading
Antivirus

Major new malware strain targets crypto users via malicious ads – here’s what we know, and how to stay safe

Check Point finds thousands of ads promoting fake crypto apps The apps come with an infostealer malware targeting users The infostealer can bypass most antivirus protections Cryptocurrency users are being targeted by a highly sophisticated, widespread cybercriminal campaign with the goal of deploying malware capable of grabbing exchange and wallet information, essentially robbing the people


  • Check Point finds thousands of ads promoting fake crypto apps
  • The apps come with an infostealer malware targeting users
  • The infostealer can bypass most antivirus protections

Cryptocurrency users are being targeted by a highly sophisticated, widespread cybercriminal campaign with the goal of deploying malware capable of grabbing exchange and wallet information, essentially robbing the people of their tokens, experts from Check Point have warned.

Apparently active since March 2024, what makes this campaign, dubbed JSCEAL by the researchers, unique is the use of compiled JavaScript files (JSC), which allows the malware to remain hidden from most traditional antivirus solutions.

The criminals created fake cryptocurrency exchange and wallet apps, which come with an infostealer. They also created websites to host these apps, and managed to purchase thousands of advertisements on the internet to promote the scam. Check Point says that just in the European Union (EU), 35,000 malicious ads were served between January and June 2025.

You may like

  • Cryptocurrencies Criminals are targeting Bitcoin owners on Facebook with a multi-stage malware campaign – follow these steps to stay safe
  • Scam alert Stop using these 22 Android crypto and wallet apps ASAP, or you risk losing all your cryptocurrency
  • Ledger Lifestyle Image Mac users beware – fake Ledger apps are being used by hackers to steal seed phrases and hack accounts

JSCEAL malware

“The use of Facebook’s Ad Library enabled us to estimate the campaign’s reach, while in a very conservative approach we can estimate the total reach of the malvertising campaign at 3.5 million users within the EU alone, and likely above 10 million users worldwide,” the researchers explained.

People who fall for the scam download an MSI installer which triggers “a sequence of profiling scripts” that gather critical system information. These scripts also use PowerShell commands to collect and exfiltrate data, in preparation of the final payload deployment.

This final payload is the JSCEAL malware, which steals crypto-related data such as credentials and private keys. The payload is executed through Node.js, it was said.

What makes this malware particularly dangerous is the use of compiled JavaScript files.

Read More

Continue Reading
Antivirus

From breached to bulletproof: The new rules of cybersecurity are about survival

Listen up, IT professionals. If you’re still treating cybersecurity like a checkbox exercise, you’re already three steps behind the attackers. The digital battlefield has changed, and the old rules no longer apply. Gone are the days when a firewall and antivirus software were enough to keep your organization safe…

Listen up, IT professionals. If you’re still treating cybersecurity like a checkbox exercise, you’re already three steps behind the attackers. The digital battlefield has changed, and the old rules no longer apply. Gone are the days when a firewall and antivirus software were enough to keep your organization safe…
Read More

Continue Reading
Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading