Cyberthreat

Device Security

Internet Of Things

Most popular in Device Security

Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published July 20, 2022 ·4 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published August 08, 2018 ·2 min read
6 mobile gaming scams and how to avoid them
There are risks involved in mobile gaming. But you can avoid the scammers. Learn how.
Published July 12, 2022 ·2 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published August 08, 2018 ·2 min read
Why public Wi-Fi could be a disaster for you
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Published August 08, 2018 ·3 min read
Do you need antivirus protection on your phone?
Your phone has so much important information on it – from photos to your banking information. So do you need antivirus protection to keep it secure?
Published August 08, 2018 ·4 min read
What to do when a device is lost or stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Published August 08, 2018 ·4 min read

Internet of Things

What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published August 01, 2022 ·3 min read
Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published July 20, 2022 ·4 min read
What’s a Smart Home?
Smart home tech has become more accessible in recent years - and you may have already bought smart products without even realizing it.
Published March 04, 2022 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published August 08, 2018 ·3 min read

Malware

Trojan viruses: Detecting and removing
Help protect your device against Trojan viruses. Learn effective ways and essential tips to defend against malware and other threats.
Published May 08, 2024 ·6 min read
Famous computer viruses: A historical look at notable cyberthreats
Learn about the most famous computer viruses and their impact, including examples and the history of these cyberthreats.
Published March 22, 2024 ·6 min read
What is a computer virus? Definition & how they work
Learn what a computer virus is, how it works & how it spreads. Then discover how to prevent viruses and protect your digital life.
Published February 26, 2024 ·6 min read
What is antivirus software, and do I need it?
Having more than Antivirus protection is essential. Learn why.
Published September 01, 2023 ·2 min read

Privacy

How to delete your digital footprint: Complete guide
Learn how to delete your digital footprint and why it’s important for your online privacy. Discover tips to stay private online.
Published May 21, 2024 ·8 min 45 sec read
Is free public Wi-Fi as safe as you think?
Free Wi-Fi might be appealing but it comes with risks. Learn how to stay safer on public Wi-Fi and keep your data private.
Published May 03, 2024 ·5 min read
What is Tor Browser and how is it used to access the dark web
Learn how Tor Browser is used for anonymous browsing. Discover how it works, how it’s used to access the dark web & if it's safe.
Published January 31, 2024 ·6 min read
What is an IP address? A definition + how to find it
Read about IP addresses and what their is role in your digital life. Learn what information your IP address reveals and how you can protect it.
Published November 20, 2023 ·4 min

Want more?

Follow us for all the latest news, tips and updates.