Norton Blog

Malware

Editors' picks

How is AI affecting online dating? How to stay safe
With 59% of people considering using AI as their online dating coach, looking for love is more complicated than ever before.
Published: April 23, 2024 ·6 min read
Are younger generations more susceptible to online scams?
Growing up in a tech-centric world has its drawbacks, and Gen Z is more exposed to cyber threats than ever before.
Published: April 10, 2024 ·3 min read
Norton vs. Malwarebytes: 2024 comparison guide
Choosing the right antivirus is essential if you want to stay safer online. We're going to help you decide between two of the best: Norton vs Malwarebytes.
Published: May 03, 2024 ·8 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web includes hidden sites you can’t find with normal search engines. Learn the pros and cons and how to access it safely.
Published: May 14, 2024 ·10 min read
Identity theft: What is it, how it works, and common warning signs
Identity theft happens when someone steals your personal or financial data. Read our guide to learn more.
Updated: May 21, 2024 ·9 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras (5 methods for detection)
Learn how to find hidden cameras at home, in rentals, and in public.
Updated: June 21, 2024 ·7 min read
Secure your holiday shopping on Cyber Safety Sunday
Check out these Cyber Safety tips to help protect you while you shop online.
Updated: November 15, 2024 ·6 min read
How to hide apps on your iPhone: 5 easy ways
Wondering how to hide apps on your iPhone? Learn five easy strategies to conceal apps.
Published: November 12, 2024 ·6 min read
Why am I getting so many “Scam Likely” calls and how do I stop them?
Learn why you’re receiving “Scam Likely” calls and how you can keep scam callers from bugging you.
Published: November 05, 2024 ·7 min read

Most popular in Device Security

What is streaming and how does it work?
Streaming is a method of accessing content via the internet. Read on to learn how streaming works.
Published: November 12, 2024 ·7 min read
How to send an anonymous email
Learn how to send an anonymous email with a VPN, through Tor, or using one of our other proven methods.
Updated: November 12, 2024 ·7 min read
What are cookies? How they work and when to accept them
What are internet cookies? Learn about different cookie types and what they’re used for in our guide.
Updated: November 05, 2024 ·9 min read

Most popular in Device Security

What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Sharenting and knowing when you’ve shared too much
Are you worried about what’s posted about your kids online? Learn about the dangers of sharenting and how to protect your child’s privacy.
Published: September 16, 2024 ·6 min read
Tablets in schools—A parent's guide to data protection
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: September 16, 2024 ·6 min read

Want more?

Follow us for all the latest news, tips and updates.