Norton Blog

Online Scams

Editors' picks

11 types of Facebook Marketplace scams and what to do if you fall for one
Learn about the most common Facebook Marketplace scams and how to protect yourself as a buyer or seller.
Updated: August 13, 2024 ·11 min read
How does Spotify Wrapped work and what data do they collect?
How does Spotify Wrapped work? Discover the secret to the music app’s insights and learn whether your data is secure.
Published: December 05, 2024 ·5 min read
How to spot counterfeit websites when holiday shopping
Before holiday shopping, learn how to spot counterfeit websites and avoid deals that are too good to be true.
Published: December 03, 2024 ·5 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web includes hidden sites you can’t find with normal search engines. Learn the pros and cons and how to access it safely.
Published: May 14, 2024 ·10 min read
Identity theft: What is it, how it works, and common warning signs
Identity theft happens when someone steals your personal or financial data. Read our guide to learn more.
Updated: May 21, 2024 ·9 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras (5 methods for detection)
Learn how to find hidden cameras at home, in rentals, and in public.
Updated: June 21, 2024 ·7 min read
The top social media threats of 2025
Learn how to better protect your accounts from the top social media threats of 2025 and beyond.
Updated: January 14, 2025 ·13 min read
What is a computer worm? How they work and spread
Computer worms are a dangerous type of self-replicating malware. Here’s a guide to how they work and how to defend against them.
Updated: January 13, 2025 ·9 min read
What is quishing? Learn to spot QR code phishing and stay safer online
Quishing is a scam that uses QR codes to steal your information. Learn how you can protect against QR code scams.
Published: January 13, 2025 ·6 min read

Most popular in Device Security

Split tunneling: What is it, how does it work, and is it secure?
Split tunneling is a VPN feature that lets you balance data security, performance, and accessibility. Learn more here.
Published: January 14, 2025 ·7 min read
Do my apps truly need to have so much access to work?
Curious about app permissions to avoid in 2025? Discover best practices for digital safety.
Published: January 08, 2025 ·6 min read
Proxy vs. VPN: What’s the difference and which one should you use?
Learn the differences between VPN vs. proxy to see how they keep your internet activity more private.
Updated: December 31, 2024 ·9 min read

Most popular in Device Security

What is the Internet of Things? Learn what it means, examples, and more
The IoT (Internet of Things) is a system of billions of devices that communicate through the internet. Read on to learn more.
Updated: December 27, 2024 ·9 min read
iPhone parental controls: 9 tips to keep your kids safer
These iPhone parental controls can help you manage your kids' online activities and keep them safer.
Published: December 27, 2024 ·11 min read
What is firmware? Different types and how to update it
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: December 23, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.