Try Norton 360 FREE 30-Day Trial*
30 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
Cyberthreat Protection
Malware
Famous computer viruses: A historical look at notable cyberthreats
Published March 22, 2024 6 min readRelated articles
What is a computer virus? Definition & how they work
Learn what a computer virus is, how it works & how it spreads. Then discover how to prevent viruses and protect your digital life.
Published February 26, 2024 ·6 min read
How to delete or deactivate your Instagram account: Step-by-step guide
Follow our simple step-by-step guide that will help you delete or deactivate your Instagram account in no time. Read it here!
Published February 18, 2024 ·6 min read
Deepfake AI: What are deepfakes & how to spot them?
Uncover the secrets of deepfakes. Learn what deepfakes are and how to spot them in today's digitally manipulated AI world!
Published November 17, 2023 ·2 min
Online Privacy
Privacy
What is Tor Browser and how is it used to access the dark web
Published January 31, 2024 6 min readMost popular in Device Security
Related articles
Anonymous browsing: How to stay anonymous while browsing the web
Want to stay anonymous while browsing the internet? Explore 5 tips to browse the internet anonymously and safeguard your online privacy.
Published November 17, 2023 ·3 min
The risks of public Wi-Fi
Did you know there could be threats lurking in the background on public Wi-Fi while you balance your bank account and sip a latte at your favorite cafe?
Published August 08, 2018 ·4 min read
How to clean up your online digital footprint
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.
Published August 08, 2018 ·4 min read
Device Security
Kids' Safety
Published July 12, 2022
2 min read
6 mobile gaming scams and how to avoid them
There are risks involved in mobile gaming. But you can avoid the scammers. Learn how.
Most popular in Device Security
Related articles
What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published August 01, 2022 ·3 min read
VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published August 08, 2018 ·3 min read
VPN for smartphones
How does a VPN for your smartphone protect your privacy? Learn how using a VPN on your smartphone, especially while using public Wi-Fi networks, can help keep your browsing activity safe and private.
Published August 07, 2018 ·3 min read
Want more?
Follow us for all the latest news, tips and updates.