5 mobile security threats you can protect yourself from
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Explore topics
30 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
What is bluejacking?
Bluejacking is a Bluetooth attack in which a hacker spams your device with unsolicited phishing messages.
Why is my battery draining so fast?
Your battery may be draining quickly either from you using a lot of its energy or from settings or issues that can cause your device to burn through its battery life inefficiently.
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.
A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.
The Internet of Things is a growing system of billions of devices — or things — worldwide. They connect to the internet and each other through wireless networks.
Hot new gadgets make your home smarter and sometimes vulnerable. Here’s how to secure your smart home and your IoT devices.
The security of your home Wi-Fi connection is serious cause for concern. With the proliferation of IoT devices, the home network is bombarded with malware. 7 in 10 consumers wish their home network were more secure, but only 27% believe their network will be compromised. A guest network has the advantage of having its own password.
Website spoofing, aka domain spoofing, occurs when a scammer mimics the website of a trusted company with the goal of stealing visitors' personal information.
Most devices have a camera these days. So we’re sharing nine easy ways to increase your webcam security and keep yourself safe.
Malvertising can infect your computer with malicious software even when visiting legitimate sites. Here’s how.
Ransomware extorts money from victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking someone into installing it. It typically scores high profile victims like hospitals, public schools and police departments.
For those wary of nosy websites or hackers, many people use Tor and VPNs for protection. To learn more about each tool, follow this Tor vs. VPN breakdown.
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Here's help in how to make Facebook private. You can boost your privacy on Facebook with some simple steps. Here are our suggestions for sharing a bit less on your Facebook timeline.
How safe is blockchain technology? Here, we overview the term, plus blockchain security threats and best practices to avoid them.
Want more?
Follow us for all the latest news, tips and updates.