How To

110 articles

Why you should install software updates and operating system updates today
Software updates and operating system updates help keep your devices running smoothly while protecting against hackers and malware.
Updated: February 29, 2024 ·9 min read
Cyberstalking: What it is and how to protect yourself
Cyberstalking is when a cybercriminal uses electronic devices and communications to threaten or harass someone. Learn more.
Updated: February 28, 2024 ·8 min read
How to use a flash drive (Windows vs. Mac)
Learn how to use a flash drive on Mac and Windows devices to back up your data and keep it secure in our step-by-step guide.
Published: February 28, 2024 ·14 min read
How to encrypt email in Gmail, Outlook, iOS, and Android
Learn how to encrypt email in Gmail, Outlook, iOS, and Android devices using this guide. We’ll also teach you how to keep your email safer and more secure.
Updated: February 23, 2024 ·9 min read
How to free up RAM: 19+ effective methods for Windows and Mac
Here are several ways to free up RAM on your computer. 1. Restart your device 2. Use another browser 3. Clear RAM cache 4. Update software 5. Delete extensions.
Updated: February 23, 2024 ·8 min read
How to know if your computer has a virus: 9 warning signs
Think your computer is infected? Learn how to know if your computer has a virus, the signs to look out for, and how to respond.
Updated: February 18, 2024 ·9 min
Unlocking the secrets of your zodiac sign for stronger passwords
When you're trying to figure out how to create a strong password, why not look to the stars?
Published: February 08, 2024 ·4 min read
How to set up a secure guest Wi-Fi network
Learn what a guest Wi-Fi network is, how it works, and how to set up Wi-Fi access for guests in your home.
Updated: January 17, 2024 ·11 min
14 cryptocurrency scams to avoid in 2024
Discover the latest tactics used in cryptocurrency scams. Arm yourself with the knowledge you need to protect your investments and your cryptocurrency assets.
Published: January 04, 2024 ·14 min read
How to detect spyware and remove it
Find out how to detect spyware and safeguard your online activities. Learn to recognize spyware on Android, iOS, and computers, plus tips for how to get rid of it.
Published: January 02, 2024 ·18 min
How to choose antivirus software in 2024
Learn how to choose the best antivirus software to fit your needs with our expert tips in this guide. Protect your device with the right security software.
Published: December 06, 2023 ·10 min read
What is an SSL certificate?
What is an SSL certificate? Learn what SSLs are and why they strengthen online security. Discover different types and how to get one for your website.
Published: November 28, 2023 ·11 min read
How to check if a website is safe: an 11-step guide
Learn how to tell if a website is safe with our guide. By understanding what to look out for, you can protect your personal information and browse securely.
Published: November 23, 2023 ·11 min
How to get free Wi-Fi
Did you know you can get free Wi-Fi anywhere in the world at any time without sacrificing your device’s security? Read on to learn more.
Published: November 23, 2023 ·10 min
How to block websites on Chrome, Safari, and more
Learn how to block websites that display malicious or inappropriate content. Use our guide to block sites on Chrome and other browsers.
Published: November 22, 2023 ·6 min read
Cyber Safety Sunday rings in the merry and bright side of digital living this holiday season
Cyber Safety Sunday, Norton’s new shopping holiday, arrives just in time to help protect you during the most-festive time of the year.
Published: November 20, 2023 ·
Password tricks – our treat for you this season
Is a password really that useful if you can’t remember it? We have the tricks you can use to make yours both memorable and secure.
Published: November 13, 2023 ·4 min read
Instagram hacked? How to get your account back
Find out how to tell if your Instagram account was hacked and how to recover your account after it was hacked or deleted in this easy-to-follow guide.
Published: November 08, 2023 ·10 min read
How to encrypt a flash drive on Mac + Windows
Learn how to encrypt a flash drive on Mac & Windows with a strong password to help protect your personal data from being lost or stolen.
Published: November 04, 2023 ·7 min
How to change your Wi-Fi router password: 4 easy steps
Learn how to change your Wi-Fi router password in four easy steps. Enhance your network security and protect your communications and data from unauthorized access.
Published: November 01, 2023 ·6 min read
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Published: October 25, 2023 ·9 minutes
Is mobile banking safe? 5 major security risks in 2024
Is mobile banking safe? It can be if you learn about the security risks associated with mobile banking and take steps to help protect yourself from them.
Published: October 20, 2023 ·6 min read
How to bring your computer back from the dead
If your computer won’t turn on, this guide offers tips to help troubleshoot why your computer may be dead and how to help resolve what is causing it.
Published: October 06, 2023 ·5 min read
‘It's easy to stay safe online’ with these 4 steps (plus 1)
Here are the four key steps with easy action items, plus a bonus task to help you protect yourself from identity theft this year.
Published: September 21, 2023 ·4 min read
How to install a VPN on a router: Setup + pros & cons
If you want VPN protection at home, you may have wondered how to install a VPN on a router. Follow this guide to learn how and the pros and cons of doing so.
Published: September 15, 2023 ·9 min read
Blue screen of death: What is the BSOD? + How to fix it
Seeing the blue screen of death (BSOD) on your computer can be infuriating. Follow our guide to learn how to fix the blue screen of death in Windows.
Published: September 08, 2023 ·12 min read
COVID-19 and new device security: 9 tips to help stay cybersafe
If you just purchased a new device in the COVID-19 era, there are steps you can take to help set up and maintain its security. | NortonLifeLock
Published: September 01, 2023 ·2 min read
What to do if you're a victim of malware
Trojan horses, bots, adware, ransomware, macro viruses, rogueware, spyware, worms and phishing attacks target Internet users every day. The more we use the Internet, the more vulnerable we are to threats. There are many security measures that Internet users can put in place to minimize putting themselves at risk from malicious attacks.
Published: September 01, 2023 ·4 min read
What is a computer driver? A simplified guide
What is a computer driver? It's software that tells your device how to operate its hardware parts. Learn why it’s important to keep your drivers updated.
Published: September 01, 2023 ·6 min read
What is the dark web and how do you access it?
The dark web sounds ominous, but many people use it for enhanced privacy and security. Learn how to access it plus tips to stay safe while browsing.
Published: July 19, 2023 ·3 min read
Cybersecurity basics for beginners: 2024 guide
Protect yourself online by familiarizing yourself with these cybersecurity basics, like types of cyberattacks and cybersecurity best practices to follow.
Published: July 18, 2023 ·2 min read
How to remove a hacker from my phone + tips to prevent hacking
To remove a hacker from your phone, you should review app permissions, remove unfamiliar apps, update the operating system, clear cache, or do a factory reset.
Published: July 12, 2023 ·2 min read
How to remove personal information from the internet: 9 methods for 2024
Follow the nine steps in this guide to learn how to remove personal information from the internet and protect your identity.
Published: June 28, 2023 ·3 min
How to fix a “Your connection is not private” error
How to fix a “your connection is not private” error yourself, what the error message means, and how to proceed if your troubleshooting efforts fall short.
Published: June 15, 2023 ·3 min read
Is my phone listening to me? Yes, here’s why and how to stop it
Is my phone listening to me? Yes. Read more from the Norton blog about why it happens and how to help stop it.
Published: June 13, 2023 ·2 min read
How to clear cookies + cache in every browser
Discover how to clear cookies from Chrome, Firefox, Safari, and other browsers to browse online more securely.
Published: June 13, 2023 ·4 min read
How to lower ping and ultimately reduce lag in video games
Consider this the online gamers’ guide on how to lower your ping and, ultimately, reduce lag in video games by following these troubleshooting steps and tips.
Published: June 13, 2023 ·4 min read
How to get rid of spam emails
Email spam is unsolicited, bulk-sent email messages sent to an inbox. Learn how to get rid of spam emails from invading your privacy.
Published: June 13, 2023 ·4 min read
How to remove malware from a Mac or PC
Malicious software can threaten your cybersecurity and leak your sensitive information. Read our guide to learn how to remove malware from a Mac or PC.
Published: March 17, 2023 ·3 min read
How to file taxes online safely + tips
Learn how to file taxes online safely by following these steps. The goal is to keep your personal and financial information private when filing your taxes.
Published: February 06, 2023 ·3 min read
How to find hidden cameras: 10 detection methods
Be it a hotel or vacation rental, you may wonder about hidden cameras. Follow this guide to learn how to find hidden cameras and help protect your privacy.
Published: December 21, 2022 ·2 min read
Data backups 101: A complete guide for 2024
Data backups are a great way to help keep your files safe. Follow this guide to learn more about data backups and the importance of backing up your data.
Published: November 09, 2022 ·3 min read
How to extend Wi-Fi range: 12 ways to boost your signal
Are you tired of dealing with spotty Wi-Fi, researching "how to extend Wi-Fi range" for answers? To combat this, follow these steps to boost your Wi-Fi signal.
Published: November 03, 2022 ·2 min read
How to set parental controls on every device: An absolutely ultimate guide
The internet allows children to access almost anything. To help keep your child safe, learn how to set parental controls on all popular devices and platforms.
Published: September 29, 2022 ·3 min read
How to make your computer faster: 12 ways to improve computer performance
Do you feel like your computer is getting slower by the day? If so, follow these tips to learn how to make your computer faster and improve its performance.
Published: September 19, 2022 ·3 min read
How to protect against phishing: 18 tips for spotting a scam
Have you ever come across a phishing email and wondered how to best protect yourself? Check out this guide to learn how to protect against phishing attacks.
Published: September 18, 2022 ·4 min read
Top sites to download free ebooks
Here’s a list of free ebook sites from the well-known and popular to the sometimes obscure and fringe. Find something to engage and inspire, dream and escape, or edify and learn.
Published: August 31, 2022 ·3 min read
VPN tests: How to tell if a VPN is working
A virtual private network (VPN) helps encrypt your online activity, disguising your browsing. But what happens when a VPN fails you? That’s where a VPN test comes in.
Published: July 01, 2022 ·2 min read
What are cookies?
The purpose of the computer cookie is to help the website keep track of your visits and activity. Cookie settings can help protect your privacy online.
Published: May 13, 2022 ·4 min read
How to get free Wi-Fi: The digital nomad's guide to cybersecurity
As digital nomads are on the rise, knowing how to get free Wi-Fi — and knowing how to get Wi-Fi anywhere — is crucial. Consider the following methods and cybersecurity tips.
Published: May 11, 2022 ·2 min read
Ways to avoid identity theft + ID theft statistics for 2024
This comprehensive identity theft protection guide overviews ways to avoid identity theft, types of identity theft, as well as identity theft statistics.
Published: April 20, 2022 ·2 min read
How to protect personal information online: A simplified guide
Consider this your go-to guide on how to protect personal information online, including tools and best practices that can help protect your privacy and security.
Published: March 14, 2022 ·2 min read
Spring clean your phone for a better digital life
Spring cleaning is not just for your home. Deep clean your phone and give it the tidying up it deserves.
Published: February 14, 2022 ·3 min read
How to know if a website is safe: 10 steps to verify secure sites
Review the ultimate guide on how to know if a website is safe this holiday season and beyond with tips and 10 steps for how to check if a website is secure.
Published: October 27, 2021 ·4 min read
How to securely store passwords – tips for managing and storing passwords
Learn how and why it’s important to securely store your passwords. Find out the pros and cons of password managers, plus unsecure storage methods to avoid.
Published: August 12, 2021 ·3 min read
How to hack-proof your dorm room: 10 tips
Back-to-school time is a fertile period for scam artists to target college students. Take these steps to help hack-proof your dorm room.
Published: August 04, 2021 ·4 min read
Q&A: Is it safer to do banking on my computer or phone?
Whether it's safer to bank by computer or phone depends on a variety of factors, but these tips can help whenever you bank online.
Published: July 15, 2021 ·2 min read
Q&A: I left my data on the infotainment system of a rental car. Problem?
When you use Bluetooth to connect your phone to a rental car infotainment system, the system could get ahold of your call logs, contacts list, phone number, and more. Learn what to do.
Published: July 15, 2021 ·4 min read
Bloatware: Why it's a concern plus how to remove it
Buy a new device and it’s running slow? Bloatware could be your problem. Consider these following types, how to remove them, and the cyber threats they’re associated with.
Published: June 10, 2021 ·2 min read
Digital generations: The technology gap between seniors, parents, and kids
An overview of the term digital generations and the digital natives and digital immigrants who fall under it, plus tips for each generation to stay cyber-wise.
Published: May 26, 2021 ·3 min read
25 vital computer maintenance tips and checklist to protect your device
Computer maintenance means keeping your computer in good condition through regular cleanings, hard drive updates, and virus prevention. Find out how.
Published: May 25, 2021 ·3 min read
How to request to remove info from people search sites – Whitepages, MyLife, Spokeo, and more
Learn how to request to remove your personal information from more than a dozen people search sites with this step-by-step guide.
Published: April 08, 2021 ·4 min read
Survey: Majority of Americans put their confidential data on a piece of paper, not the cloud
The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace.
Published: April 05, 2021 ·2 min read
A guide for how to spot fake news
Fake news can be hard to spot for adults and children. Here’s a guide to help decipher what’s real and what’s fiction on the internet.
Published: March 22, 2021 ·3 min read
Are you a digital hoarder? 12 signs plus tips to declutter your data
An overview of what digital hoarding is, plus data hoarding habits to consider and tips to clean up our digital clutter.
Published: March 05, 2021 ·4 min read
What is cryptocurrency and how does it work? What you need to know
An introduction to cryptocurrency. Learn what it is, how it works, and how it could affect the future.
Published: March 04, 2021 ·4 min read
Good cyber hygiene habits to help stay safe online
Cyber hygiene involves using products and tools that fit your needs, performing hygienic tasks correctly, and starting a routine.
Published: January 23, 2021 ·3 min read
How to secure your iPad and keep it that way
How to maximize security and privacy while you enjoy convenience and entertainment with your iPad, wherever you happen to be.
Published: January 14, 2021 ·3 min read
11 security steps to take after unboxing your new devices
Before your new tech gadget becomes part of your day-to-day life, here’s what you need to know about helping to assure privacy and security.
Published: January 13, 2021 ·4 min read
How to stay safer online: Your 2024 online privacy and device security checklist
Take these 10 steps to help protect your online privacy and device security in 2024.
Published: December 03, 2020 ·3 min read
How to safely donate your old laptop, smartphone and other tech gadgets
Donating your old smartphone, laptop, or tablet is a way to help a person or organization in need. Learn how to do it safely.
Published: November 19, 2020 ·3 min read
Your must-know guide to new tech set up and device security
Getting one of those top tech gifts over the holidays in 2020? Learn new device security best practices and set up pointers.
Published: November 19, 2020 ·4 min read
How to teach digital citizenship, plus printable posters and games
Consider this your comprehensive guide to digital citizenship. Discover what it means to be a digital citizen, how to teach it — and printable games to help.
Published: November 18, 2020 ·4 min read
What is two-factor authentication (2FA) and how does it work?
Two-factor authentication (2FA) is a way to add an extra layer of security to your personal information that is stored online. We explain how it works.
Published: October 15, 2020 ·2 min read
How to increase download speed: 15 tips and tricks
You may be able to increase your download speed if yours is slow. Learn some simple and more complex ways to do it.
Published: October 06, 2020 ·4 min read
11 ways to help protect yourself against cybercrime
Cybercrime is any crime that takes place online or primarily online. Cybercriminals often commit crimes by targeting computer networks or devices. Other cybercrimes include things like “revenge porn,” cyber-stalking, bullying, and child sexual exploitation.
Published: August 15, 2020 ·2 min read
How to keep your cell phone clean in the COVID-19 era: Hardware and software
Learn how to clean the outside and inside of your cell phone for your own health and for the safety of your data and devices.
Published: May 09, 2020 ·3 min read
How to wipe a computer hard drive in 5 steps
Your personal information will be retrievable on a computer’s hard drive unless you take steps to wipe the hard drive clean. Learn how from Norton.
Published: February 17, 2020 ·2 min read
What is an SSL certificate?
An SSL certificate is a digital certificate that authenticates the identity of a website. They’re often used on pages that require users to submit personal or credit card information. Learn the different types of SSL certificates and the benefits and disadvantages of each.
Published: December 17, 2019 ·4 min read
How to remove GPS and other metadata locations from photos
Many digital photographers don’t realize that their photos might carry metadata about locations, time and date, or the device that took the photo. Removing it before posting photos online is crucial to protecting your identity and privacy.
Published: August 27, 2019 ·4 min read
What is spyware? And how to remove it
Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Published: August 09, 2019 ·2 min read
How to clean your computer: Software and hardware
Clean computing is the practice of maintaining a clean machine, including hardware and software. The average computer is 5-1/2 years old, according to one estimate. Clean hardware can help your computer run more smoothly and extend your computer’s lifespan. Regular cleaning protects your investment and your data.
Published: June 13, 2019 ·2 min read
7 most important cyber safety topics you should learn about
Discover the 7 most important cyber safety topics you should learn about from the Norton blog. Click to read more.
Published: April 26, 2019 ·2 min read
10 cybersecurity best practices that every employee should know
If you work for a small or midsize company, it's smart to learn about cybersecurity best practices. A single employee could make a mistake by sharing sensitive company information on their smartphone or clicking on a corrupt link. Cybercriminals can create email addresses and websites that look legitimate. Scammers can fake caller ID information.
Published: April 09, 2019 ·2 min read
Cyberstalking: Help protect yourself against cyberstalking
Cyberstalking is defined as online stalking. It involves the repeated use of the internet or other electronic means to harass, intimidate or frighten a person or group. Cyberstalkers may use email, instant messages, phone calls, and other communication modes to stalk you.
Published: April 02, 2019 ·4 min read
Router security: How to setup Wi-Fi router securely
Unsecured wi-fi routers can be a liability when it comes to hackers and squatters. Some new routers come with default passwords, but you should change these during setup. Most modern routers allow users to disable WPS. For the online safety of your network and devices, it’s smart to never disable a firewall.
Published: February 06, 2019 ·4 min read
How do firewalls prevent computer viruses?
Firewalls function as a critical line of defense against cybercriminals. Know what they protect and how they work.
Published: August 08, 2018 ·4 min read
6 tips to avoid getting a virus on your devices from the internet
How do you avoid getting a virus on your devices from the internet? Here’s our tips to help keep you protected.
Published: August 08, 2018 ·3 min read
How to create a hack-proof password
Think of passwords as the keys to your digital life. Learn seven tips on how to create hack-proof passwords that will keep hackers away from your private information.
Published: August 08, 2018 ·2 min read
How to improve your Wi-Fi signal at home
How to improve your Wi-Fi signal at home
Published: August 08, 2018 ·2 min read
How to safely use public Wi-Fi hotspots while holiday shopping
If you’re on free public Wi-Fi while out holiday shopping, be sure to add a little ho-ho-ho to that Wi-Fi hotspot with these security tips.
Published: August 08, 2018 ·4 min read
How to keep your personal information safe on social media
Social media runs a significant portion of people’s social lives. We use it to connect with far-flung friends and family, send quick messages to co-workers, and announce major (and minor) events in our lives. Many businesses use social media sites to collaborate or share information—for instance, you might discuss a project with co-workers via a Facebook messaging session or plan a conference on a LinkedIn forum.
Published: August 08, 2018 ·3 min read
How a password manager can help secure your passwords
Password managers help you generate, protect, and keep track of strong passwords for your online accounts.
Published: August 08, 2018 ·2 min read
8 elements to help you become a great digital citizen
8 Elements to Help You Become a Great Digital Citizen
Published: August 08, 2018 ·3 min read
5 tips to protect yourself from online travel booking scams
Thanks to the Internet, booking travel online is simple. But as your ideas of a spring break or summer vacation take shape, remember to be cautious when making reservations online. The number of...
Published: August 08, 2018 ·3 min read
From the break room to the boardroom: Creating a culture of cybersecurity in the workplace
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies,...
Published: August 08, 2018 ·2 min read
How to talk to your kids about cyberbullying
Cyberbullying is not very different from the ill reputed bullying that happens in the school yard. It has the same psychological and social implication that leaves the formative minds of children...
Published: August 08, 2018 ·3 min read
How to secure your information in the cloud
More people and businesses now use the cloud in some form, sometimes without even realizing they are doing so. Know how to secure your information on the cloud.
Published: August 08, 2018 ·4 min read
How to spot a fake Android app
If you're an Android user and you receive an unexpected SMS or a strange notification from what appears to be a familiar source, beware; criminals may be trying to rip you off. Find out how scammers try to trick you into installing a fake app.
Published: August 08, 2018 ·3 min read
How to set parental controls on every device: An absolutely ultimate guide
The internet allows children to access almost anything. To help keep your child safe, learn how to set parental controls on all popular devices and platforms.
Published: August 08, 2018 ·3 min read
How to freeze your credit report after identity theft
A credit freeze allows you to restrict access to your credit report. It can help if you’ve been a victim of identity theft.
Published: August 08, 2018 ·2 min read
Published: August 08, 2018 ·2 mins
How to stay safe when file sharing online
File sharing technology is an easy way for individuals or institutions to transfer content on the internet. There are several peer-to-peer (P2P) applications and services available. Some applications...
Published: August 07, 2018 ·2 min read
Help secure your accounts with these strong password tips
The importance of using secure, unique passwords is growing as you entrust increasing amounts of personal information to organizations and businesses that can fall victim to data breaches and password leaks. You can take the precaution of making sure you craft strong passwords for your online accounts.
Published: August 07, 2018 ·4 min read
10 critical steps to help protect yourself online
Learn how to stay safer online with tips on updates, backups, public Wi-Fi, protecting personal information, and more.
Published: August 07, 2018 ·4 min read
What to do with old computers
Take these steps to ensure your old technology has been properly wiped and recycled.
Published: August 07, 2018 ·3 min read
Securing your game console and gaming account
Todays gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are...
Published: August 07, 2018 ·3 min read
The evolution of Norton™ 360: A brief timeline of cyber safety
The evolution of Norton 360 : A brief timeline of cyber security
Published: August 07, 2018 ·2 min read
Remote computer access: What is it and what are the risks?
Learn how remote computer access works, the possible security risks, and how you can access other computers and networks remotely.
Published: August 07, 2018 ·4 min read
How to choose a secure password
Passwords are the digital keys to our networks of friends, our work colleagues, and even our banking and payment services. We want to keep our passwords private to protect our personal lives, and that includes our financial information. A good password is all that may stand between you and a cybercriminal.
Published: January 17, 2018 ·4 min read

Want more?

Follow us for all the latest news, tips and updates.