Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...
3 min read

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 7-Day Trial*
 

7 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

How to use a VPN on an iPhone or iPad in 2025
Learn how to use a VPN on an iPhone and iPad. Discover what a VPN is and how to get one on iOS devices.
Updated: March 19, 2025 ·11 min read
Can iPhones get hacked? Yes, and here’s how to handle it
Learn how to recognise hacked iPhone and what to do to get rid of the threats.
Published: January 20, 2025 ·14 min read
Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published: August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. In this post we’ll outline how you can keep your personal data protected from prying eyes.
Published: August 08, 2018 ·2 min read

Internet of Things

What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published: August 01, 2022 ·3 min read
Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published: July 20, 2022 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published: August 08, 2018 ·3 min read
The connected home: How safe is it?
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Published: August 08, 2018 ·4 min read

Malware

Can Macs get viruses, and do they need antivirus?
This guide teaches you how to keep your Mac safe from viruses, malware, and other online threats that could harm your device.
Updated: March 17, 2025 ·11 min read
15 types of malware: real-world examples and protection tips
Different types of malware include trojans, worms, viruses, and many more. Learn about them here.
Published: March 11, 2025 ·15 min read
How to remove malware and viruses from a Mac or PC
Learn how to remove malware and viruses from your device before they can expose sensitive information to hackers.
Published: March 08, 2025 ·12 min read
What is a keylogger? A total protection guide
Learn how keylogger attacks can affect you and how you can protect yourself and your device.
Published: February 25, 2025 ·12 min read

Privacy

Data brokers: Who are they and how do they affect you?
Learn about who data brokers are, how they collect data and how you can protect your data from them.
Published: March 13, 2025 ·9 min read
Should you accept cookies? 5 scenarios when you shouldn’t
Learn in which scenarios you should not accept website cookies and what happens if you decline.
Published: March 07, 2025 ·4 min read
Is public Wi-Fi safe? An ultimate guide to its risks
Learn about the security of public Wi-Fi and what you can do to eliminate its risks.
Published: March 06, 2025 ·10 min read
What is 2FA: A simplified guide to two-factor authentication
Learn what two-factor authentication is and how it can drastically improve the security of your accounts.
Published: March 05, 2025 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.