Cyberthreat

Device Security

Mobile

Most popular in Device Security

What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
Why is my battery draining so fast? Top reasons and tips
Learn why your phone battery drains so fast and get tips to prevent excess battery drain and keep your phone working longer.
Updated: December 20, 2024 ·13 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

How to stop pop-up ads on Android phones and iPhones
Want to know how to stop pop-up ads on your Android or iPhone? Read our guide to get a smoother, safer mobile experience.
Updated: January 24, 2025 ·8 min read
How to use a VPN on an iPhone or iPad in 2025
Learn how to use a VPN on an iPhone and iPad. Discover what a VPN is and how to get one on iOS devices.
Updated: January 22, 2025 ·11 min read
Why is my battery draining so fast? Top reasons and tips
Learn why your phone battery drains so fast and get tips to prevent excess battery drain and keep your phone working longer.
Updated: December 20, 2024 ·13 min read
SMS spoofing: What it is and how to protect yourself
Learn about SMS spoofing and how scammers can disguise their phone number to trick you into revealing information.
Updated: December 05, 2024 ·9 min read

Internet of Things

What is the Internet of Things? Learn what it means, examples, and more
The IoT (Internet of Things) is a system of billions of devices that communicate through the internet. Read on to learn more.
Updated: December 27, 2024 ·9 min read
What is firmware? Different types and how to update it
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: December 23, 2024 ·8 min read
What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Off the beaten track—How to choose a GPS for hiking safety
Ready to embark on your next hiking adventure? A GPS tracker may help you stay safe and connected while exploring nature.
Published: August 28, 2024 ·6 min read

Malware

How to remove malware from a Mac or PC
Learn how to remove malware from your device before it can expose sensitive information to hackers.
Updated: January 24, 2025 ·12 min read
What is a computer worm? How they work and spread
Computer worms are a dangerous type of self-replicating malware. Here’s a guide to how they work and how to defend against them.
Updated: January 13, 2025 ·9 min read
Ransomware protection: What it is and how to protect yourself
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: December 31, 2024 ·14 min read
Malvertising: What it is and how to prevent it
Malvertising is the combination of malware and advertising. Find out how to prevent it and stay safe online.
Updated: December 27, 2024 ·8 min read

Kids Safety

Is TikTok safe? Risks you should be aware of
TikTok may seem safe, but this popular app has its fair share of security risks. Learn how you can stay safer on TikTok.
Updated: January 23, 2025 ·7 min read
Split tunneling: What is it, how does it work, and is it secure?
Split tunneling is a VPN feature that lets you balance data security, performance, and accessibility. Learn more here.
Published: January 14, 2025 ·7 min read
Do my apps truly need to have so much access to work?
Curious about app permissions to avoid in 2025? Discover best practices for digital safety.
Published: January 08, 2025 ·6 min read
Proxy vs. VPN: What’s the difference and which one should you use?
Learn the differences between VPN vs. proxy to see how they keep your internet activity more private.
Updated: December 31, 2024 ·9 min read

Want more?

Follow us for all the latest news, tips and updates.