Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...

3 min read

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 7-Day Trial*
 

7 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published: August 08, 2018 ·3 min read
Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published: August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. In this post we’ll outline how you can keep your personal data protected from prying eyes.
Published: August 08, 2018 ·2 min read
Why public Wi-Fi could be a disaster for you
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Published: August 08, 2018 ·3 min read

Internet of Things

What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published: August 08, 2018 ·3 min read
The connected home: How safe is it?
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Published: August 08, 2018 ·4 min read
Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published: July 20, 2022 ·4 min read
What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published: August 01, 2022 ·3 min read

Malware

What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published: August 08, 2018 ·4 min read
What is cyber security? What you need to know
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
Published: August 09, 2018 ·4 min read
What is Grayware?
Grayware can affect your device’s performance and compromise your security online, as well as being a nuisance.
Published: May 12, 2022 ·4 min read
Spear phishing: A definition plus differences between phishing and spear phishing
Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Published: June 01, 2022 ·3 min read

Privacy

9 ways to help keep your personal data safe during vacation
Vacations can be an exciting, happy time for people to get away and avoid the everyday worries of home. But fun can come to a halt if your personal data is compromised while traveling.
Published: August 08, 2018 ·2 min read
Are VPNs legal or illegal?
VPNs are legal to use in many countries, but you should understand what may be legal and illegal while using a VPN.
Published: August 08, 2018 ·3 min read
Control vs. Convenience vs. Cost: Consumers demand more control over personal data yet may not be willing to pay organisations to protect it
Our 2018 Norton LifeLock Cyber Safety Insights Report (NLCSIR) estimates that Australians lost 37 million hours and $1.3 billion as an impact of cyber-crime in the past year
Published: August 08, 2018 ·2 min read
Are free VPNs safe? 7 things to know before using free VPNs
You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.
Published: August 08, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.