Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...

3 min read

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 7-Day Trial*
 

7 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published: August 08, 2018 ·3 min read
Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published: August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. In this post we’ll outline how you can keep your personal data protected from prying eyes.
Published: August 08, 2018 ·2 min read
What to do when a device is lost or stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Published: August 08, 2018 ·4 min read

Internet of Things

Mobile fitness trackers may be one step away from hacks
Wearable health tracking devices and apps unfortunately feature multiple vulnerabilities hackers can exploit to gain access to your personal information.
Published: August 08, 2018 ·4 min read
How to protect your connected wearables
The popularity of smartwatches and jewelry is gaining momentum as more people discover the convenience of having the power of the internet literally in the palms of their hand, in addition to the Internet of Things (IoT) concept in the marketplace.
Published: August 08, 2018 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published: August 08, 2018 ·3 min read
What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published: August 01, 2022 ·3 min read

Malware

Android malware
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again.
Published: August 08, 2018 ·3 min read
Macro viruses
A macro virus is defined as “a computer virus written in the same macro language used for software applications, such as word processors.”
Published: August 08, 2018 ·4 min read
How to remove malware from Android phones
Is my Android device infected by malware? How can I remove it? Here is some useful information that may help answer your questions.
Published: August 08, 2018 ·2 min read
IP spoofing: What is it and how does it work?
IP spoofing allows cybercriminals to infect your computer with malware, steal your sensitive data, and crash your server, often without detection.
Published: August 09, 2018 ·3 min read

Privacy

Data Privacy Day 2019: Ten ways to keep your data more private
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. While this is good for productivity and...
Published: August 08, 2018 ·4 min read
Choosing Convenience Over Security
Choosing Convenience Over Security
Published: August 08, 2018 ·3 min read
9 ways to help keep your personal data safe during vacation
Vacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.
Published: August 08, 2018 ·2 min read
Internet tracking: How and why we’re followed online
Internet tracking is how websites study our behaviour when we visit them.
Published: June 09, 2022 ·3 min

Want more?

Follow us for all the latest news, tips and updates.