Norton Blog

Privacy

Recently published

How to detect and remove spyware on Android, iPhone, PC and Mac
Learn how to detect spyware and safeguard your online activities on Android, iOS, PC, and Mac.
Published December 13, 2024 · 18 min
How to know if your phone is hacked: 5 warning signs and protection tips
Learn whether your phone is hacked and what to do if it is. Here are the main signs to watch out for.
Updated December 13, 2024 · 14 min read
12 WhatsApp scams to know and avoid
Learn about common WhatsApp scams and how to avoid them so you can chat safely online.
Updated July 11, 2025 · 12 min read

Use a VPN to access your favorite content and browse privately on all your devices

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

Famous computer viruses: A historical look at notable cyberthreats
Learn about the most famous computer viruses and their impact, including examples and the history of these cyberthreats.
Published March 22, 2024 · 6 min read
How to tell if someone is watching you through your phone camera
Hacking smartphone cameras is less common than before but possible. Learn the warning signs and tips for protecting your privacy.
Published January 27, 2025 · 10 min read
What to do if a scammer has your email address – 8 tips
What should you do if a scammer has your email address? Find out if you’ve been hacked and how to safely protect your account.
Published February 20, 2025 · 8 min read
Is my phone listening to me? Here is what to do if so
Your smartphone listens to you almost constantly. Learn why and how to protect your privacy.
Published February 12, 2025 · 6 min read
What is Pegasus spyware, and how to detect and remove it
Pegasus spyware is one of the most sophisticated digital surveillance tools out there. Learn what it is and how it works.
Updated August 27, 2025 · 8 min read
Clone phishing: What it is and how to prevent it
In clone phishing scams, cybercriminals send fake messages from real brands to steal your personal information.
Updated August 26, 2025 · 10 min read
What is a remote access Trojan? A cybersecurity guide
Remote access Trojans (RATs) trick you into giving hackers complete control of your device. Learn how they work and how to prevent them.
Published August 26, 2025 · 10 min read

Most popular in Device Security

What does a VPN hide? 6 common things VPNs disguise
Learn what a VPN hides so you know what parts of your online experience are protected.
Published August 26, 2025 · 4 min read
Split tunneling: What is it, how it works, and is it secure?
Split tunneling is a VPN feature that lets you balance data security, performance, and accessibility. Learn more here.
Published August 22, 2025 · 7 min read
What is a firewall? What it does and why you need it
A firewall is a network security tool that monitors network traffic to protect against unauthorised access. Here is why you need it.
Published August 22, 2025 · 9 min read

Most popular in Device Security

How to clear your cache on a Mac
Learn how to clear cache for your browser, system, and applications to free up disk space and resolve issues.
Published July 11, 2025 · 6 min read
7 reasons why your phone is so slow and 11 tips to speed it up
Discover the reasons why your phone is running slow and easy solutions how to make it faster.
Published June 19, 2025 · 9 min read
Why is my phone overheating? 7 ways to recognise and avoid it
Phone overheating can by caused by various factors. Find out how to solve them and cool down your phone here.
Published June 18, 2025 · 9 min read

Want more?

Follow us for all the latest news, tips, and updates.