Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...
3 min read

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 7-Day Trial*
 

7 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published: August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. In this post we’ll outline how you can keep your personal data protected from prying eyes.
Published: August 08, 2018 ·2 min read
Why public Wi-Fi could be a disaster for you
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Published: August 08, 2018 ·3 min read
What to do when a device is lost or stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Published: August 08, 2018 ·4 min read

Internet of Things

What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published: August 01, 2022 ·3 min read
Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published: July 20, 2022 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published: August 08, 2018 ·3 min read
The connected home: How safe is it?
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Published: August 08, 2018 ·4 min read

Malware

How to know if your phone is hacked: 5 warning signs and protection tips
Learn whether your phone is hacked and what to do if it is. Here are the main signs to watch out for.
Updated: December 13, 2024 ·14 min read
How to get rid of iPhone viruses
If you have a virus on your iPhone, there are easy ways to get rid of it. Find out how to remove iPhone viruses here.
Published: June 17, 2024 ·6 min read
Trojan viruses: Detecting and removing
Help protect your device against Trojan viruses. Learn effective ways and essential tips to defend against malware and other threats.
Published: May 08, 2024 ·6 min read
Famous computer viruses: A historical look at notable cyberthreats
Learn about the most famous computer viruses and their impact, including examples and the history of these cyberthreats.
Published: March 22, 2024 ·6 min read

Privacy

How to delete your digital footprint: Complete guide
Learn how to delete your digital footprint and why it’s important for your online privacy. Discover tips to stay private online.
Published: May 21, 2024 ·8 min 45 sec read
Is free public Wi-Fi as safe as you think?
Free Wi-Fi might be appealing but it comes with risks. Learn how to stay safer on public Wi-Fi and keep your data private.
Published: May 03, 2024 ·5 min read
What is a VPN and what does it do?
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. Learn more from Norton.
Updated: April 09, 2024 ·8 min read
What is encryption? How it works + types of encryption
Encryption converts sensitive information or data into a secret code to prevent unauthorized access. Learn how to protect your personal data with encryption.
Published: January 22, 2024 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.