Norton Blog

Privacy

Is TikTok safe? 3 TikTok scams to be aware of

TikTok is safe on the surface, but this popular app has its fair share of security risks. Learn how you can stay safe while using ByteDance's flagship app.
7 min read

Editors' picks

How AI advancements are helping catch deepfakes and scams
Teaming with Qualcomm, Norton uses NPUs and AI to help detect deepfakes and scams—your digital bodyguard against deception.
Published: January 07, 2025 ·3 min read
What is a no-log VPN? The 7 best no-log VPNs for 2025
Read our guide to learn how no-log VPNs work and discover the 7 best options for browsing the web anonymously in 2025.
Updated: December 20, 2024 ·12 min read
Online scams: An overview + 19 internet scams to avoid in 2025
Online scams cause billions of dollars in losses every year. Learn what it takes to detect and defend against them.
Updated: November 01, 2024 ·19 min read

Norton 360 FREE Trials*

Try comprehensive antivirus, device security, VPN access, and online privacy protection for FREE.*

Join today. Cancel anytime.
 

*Terms Apply

Most popular

How to tell if your phone is tapped and what to do if it is
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Updated: June 25, 2024 ·13 min read
How to stop spam texts: An easy 4-step guide
Learn how to stop spam texts by blocking numbers, reporting scams, using spam filters, and adding your number to a list.
Updated: July 10, 2024 ·10 min read
Android vs iPhone security: which is safer?
Discover the differences in Android vs iPhone security. Learn which devices and operating systems are safest and most secure before you buy.
Updated: June 28, 2024 ·9 min read
Is TikTok Shop legit? How to shop safely on social media
TikTok Shop is generally safe to use but it has its fair share of scams—learn what to look out for.
Published: November 26, 2024 ·5 min read
Is Poshmark safe? 6 common Poshmark scams to look out for
Learn about six common Poshmark scams to avoid and get tips for secure buying and selling on the online marketplace.
Published: January 17, 2025 ·9 min read
The top social media threats of 2025
Learn how to better protect your accounts from the top social media threats of 2025 and beyond.
Updated: January 14, 2025 ·13 min read
What is a computer worm? How they work and spread
Computer worms are a dangerous type of self-replicating malware. Here’s a guide to how they work and how to defend against them.
Updated: January 13, 2025 ·9 min read

Most popular in Device Security

Split tunneling: What is it, how does it work, and is it secure?
Split tunneling is a VPN feature that lets you balance data security, performance, and accessibility. Learn more here.
Published: January 14, 2025 ·7 min read
Do my apps truly need to have so much access to work?
Curious about app permissions to avoid in 2025? Discover best practices for digital safety.
Published: January 08, 2025 ·6 min read
Proxy vs. VPN: What’s the difference and which one should you use?
Learn the differences between VPN vs. proxy to see how they keep your internet activity more private.
Updated: December 31, 2024 ·9 min read

Most popular in Device Security

What is the Internet of Things? Learn what it means, examples, and more
The IoT (Internet of Things) is a system of billions of devices that communicate through the internet. Read on to learn more.
Updated: December 27, 2024 ·9 min read
iPhone parental controls: 9 tips to keep your kids safer
These iPhone parental controls can help you manage your kids' online activities and keep them safer.
Published: December 27, 2024 ·11 min read
What is firmware? Different types and how to update it
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: December 23, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.