Cyberthreat

Device Security

Internet Of Things

Most popular in Device Security

Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published July 20, 2022 ·4 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published August 08, 2018 ·2 min read
6 mobile gaming scams and how to avoid them
There are risks involved in mobile gaming. But you can avoid the scammers. Learn how.
Published July 12, 2022 ·2 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

How to use a VPN on iPhone and iPad: Exact settings explained
Learn how to use a VPN on an iPhone and iPad. This article explains the exact setup process in an easy-to-understand way.
Published January 30, 2025 ·11 min read
Can iPhones get hacked? Yes, and here’s how to handle it
Learn how to recognize hacked iPhone and what to do to get rid of the threats.
Published January 20, 2025 ·14 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published August 08, 2018 ·2 min read
Why public Wi-Fi could be a disaster for you
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Published August 08, 2018 ·3 min read

Internet of Things

What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published August 01, 2022 ·3 min read
Keep your home Wi-Fi safe in 7 simple steps
Small vulnerabilities in your home Wi-Fi network could cause problems. Learn how to secure your Wi-Fi connection in 7 simple steps.
Published July 20, 2022 ·4 min read
What’s a Smart Home?
Smart home tech has become more accessible in recent years - and you may have already bought smart products without even realizing it.
Published March 04, 2022 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published August 08, 2018 ·3 min read

Malware

Can Macs get viruses? Yes. Here's how to protect yours
This guide teaches you how to keep your Mac safe from viruses, malware, and other online threats that could harm your device.
Published March 12, 2025 ·10 min
15 types of malware: real-world examples and protection tips
Different types of malware include trojans, worms, viruses, and many more. Learn about them here.
Published March 10, 2025 ·15 min read
How to remove malware and viruses from a Mac or PC
Learn how to remove malware and viruses from your device before they can expose sensitive information to hackers.
Published February 27, 2025 ·12 min read
What is a keylogger, what are its types and how to detect it?
Learn how keylogger attacks can affect you and how you can protect yourself and your device.
Published February 24, 2025 ·4 min read

Privacy

Data brokers: Who are they and how do they affect you?
Learn about who data brokers are, how they collect data and how you can protect your data from them.
Published March 13, 2025 ·9 min read
Should you accept cookies? 5 scenarios when you shouldn’t
Learn in which scenarios you should not accept website cookies and what happens if you decline.
Published March 12, 2025 ·4 min read
What is 2FA: A simplified guide to two-factor authentication
Learn what two-factor authentication is and how it can drastically improve the security of your accounts.
Published February 28, 2025 ·8 min read
How to check if your internet is hacked: 10 warning signs
This guide will show you how to tell if someone hacked your Wi-Fi, how to fix it and protect your router.
Published February 27, 2025 ·5 min read

Want more?

Follow us for all the latest news, tips and updates.