Norton Blog

Malware

Recently published

Phishing email examples and how to identify them
These are the most common phishing email examples with tips on how to identify and avoid them.
Published March 12, 2025 ·12 min read
Should you accept cookies? 5 scenarios when you shouldn’t
Learn in which scenarios you should not accept website cookies and what happens if you decline.
Published March 12, 2025 ·4 min read
How to clear cache and cookies in your browser
Learn how to clear cache and cookies in the most popular browsers with our simple step-by-step guide.
Published March 11, 2025 ·8 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

13 WhatsApp scams to know and avoid
Watch out for WhatsApp scams while you chat with family and friends online. Learn about common WhatsApp scams and how to avoid them.
Published December 22, 2023 ·11 min
What is a Tor browser, is it safe, and legal to use?
Learn how Tor Browser is used for anonymous browsing. Discover how it works, how it's used to access the dark web, and whether it's safe.
Published January 31, 2024 ·6 min read
What is a computer virus? Definition & how they work
Learn what a computer virus is, how it works & how it spreads. Then discover how to prevent viruses and protect your digital life.
Published February 26, 2024 ·6 min read
Help protect yourself from scams on Facebook Marketplace
There are scammers pretending to sell and buy across digital marketplaces. Learn how to spot common Facebook Marketplace scams so you can avoid them.
Published June 17, 2024 ·9 min read
Phishing email examples and how to identify them
These are the most common phishing email examples with tips on how to identify and avoid them.
Published March 12, 2025 ·12 min read
How to clear cache and cookies in your browser
Learn how to clear cache and cookies in the most popular browsers with our simple step-by-step guide.
Published March 11, 2025 ·8 min read
15 types of malware: real-world examples and protection tips
Different types of malware include trojans, worms, viruses, and many more. Learn about them here.
Published March 10, 2025 ·15 min read

Most popular in Device Security

Should you accept cookies? 5 scenarios when you shouldn’t
Learn in which scenarios you should not accept website cookies and what happens if you decline.
Published March 12, 2025 ·4 min read
What is a network security key and where can you find it?
Learn what a network security key is, how to find or change it and how to keep your data safe.
Published March 03, 2025 ·8 min read
How to increase your download speed: 10 tips and tricks
Find out how to increase your download speed without having to pay to upgrade your internet plan.
Published February 28, 2025 ·6 min read

Most popular in Device Security

How to use a VPN on iPhone and iPad: Exact settings explained
Learn how to use a VPN on an iPhone and iPad. This article explains the exact setup process in an easy-to-understand way.
Published January 30, 2025 ·11 min read
Can iPhones get hacked? Yes, and here’s how to handle it
Learn how to recognize hacked iPhone and what to do to get rid of the threats.
Published January 20, 2025 ·14 min read
What is a honeypot? How it is used in cyber security?
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
Published August 01, 2022 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.