Norton Blog

Malware

Recently published

Is public Wi-Fi safe? An ultimate guide to its risks
Learn about the security of public Wi-Fi and what you can do to eliminate its risks.
Published February 24, 2025 ·9 min 46 sec read
What is a keylogger, what are its types and how to detect it?
Learn how keylogger attacks can affect you and how you can protect yourself and your device.
Published February 24, 2025 ·4 min read
How to stop spam texts on iPhone and Android
Learn how to stop spam texts by blocking numbers, reporting scams, using spam filters, and adding your number to a list.
Published February 24, 2025 ·10 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

13 WhatsApp scams to know and avoid
Watch out for WhatsApp scams while you chat with family and friends online. Learn about common WhatsApp scams and how to avoid them.
Published December 22, 2023 ·11 min
What is Tor Browser and how is it used to access the dark web
Learn how Tor Browser is used for anonymous browsing. Discover how it works, how it’s used to access the dark web & if it's safe.
Published January 31, 2024 ·6 min read
What is a computer virus? Definition & how they work
Learn what a computer virus is, how it works & how it spreads. Then discover how to prevent viruses and protect your digital life.
Published February 26, 2024 ·6 min read
Help protect yourself from scams on Facebook Marketplace
There are scammers pretending to sell and buy across digital marketplaces. Learn how to spot common Facebook Marketplace scams so you can avoid them.
Published June 17, 2024 ·9 min read
What is a keylogger, what are its types and how to detect it?
Learn how keylogger attacks can affect you and how you can protect yourself and your device.
Published February 24, 2025 ·4 min read
How to stop spam texts on iPhone and Android
Learn how to stop spam texts by blocking numbers, reporting scams, using spam filters, and adding your number to a list.
Published February 24, 2025 ·10 min read
How to create a strong password that no one can crack
Learn tips to create good, strong, and secure passwords that will keep your accounts safer.
Published February 21, 2025 ·8 min read

Most popular in Device Security

Is public Wi-Fi safe? An ultimate guide to its risks
Learn about the security of public Wi-Fi and what you can do to eliminate its risks.
Published February 24, 2025 ·9 min 46 sec read
How to check if your phone is tapped and what to do if it is
Your phone may be tapped. Learn how to recognise it and what to do to protect your privacy from unwanted guests.
Published January 17, 2025 ·11 min
How to delete your digital footprint: Complete guide
Learn how to delete your digital footprint and why it’s important for your online privacy. Discover tips to stay private online.
Published May 21, 2024 ·8 min 45 sec read

Most popular in Device Security

How to use a VPN on iPhone and iPad: Exact settings explained
Learn how to use a VPN on an iPhone and iPad. This article explains the exact setup process in an easy-to-understand way.
Published January 30, 2025 ·11 min read
Can iPhones get hacked? Yes, and here’s how to handle it
Learn how to recognize hacked iPhone and what to do to get rid of the threats.
Published January 20, 2025 ·14 min read
What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published August 01, 2022 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.