Cyberthreat

Device Security

Mobile

Most popular in Device Security

What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
Why is my battery draining so fast? Top reasons and tips
Learn why your phone battery drains so fast and get tips to prevent excess battery drain and keep your phone working longer.
Updated: December 20, 2024 ·13 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Why is my battery draining so fast? Top reasons and tips
Learn why your phone battery drains so fast and get tips to prevent excess battery drain and keep your phone working longer.
Updated: December 20, 2024 ·13 min read
SMS spoofing: What it is and how to protect yourself
Learn about SMS spoofing and how scammers can disguise their phone number to trick you into revealing information.
Updated: December 05, 2024 ·9 min read
How to block websites on iPhone: 5 different ways
Block websites on your iPhone using different methods, including Screen Time settings. Find out how here.
Published: November 22, 2024 ·6 min read
Why does my phone get hot? 7 tips to avoid overheating
Why does my phone get hot? Phone overheating is often the result of overworking the battery or processor.
Updated: August 28, 2024 ·9 min read

Internet of Things

What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Off the beaten track—How to choose a GPS for hiking safety
Ready to embark on your next hiking adventure? A GPS tracker may help you stay safe and connected while exploring nature.
Published: August 28, 2024 ·6 min read
10 IoT vulnerabilities to be aware of + protection tips
From wearables to smart TVs, IoT devices are everywhere. Learn about IoT vulnerabilities, if they're safe, and how to protect yourself.
Published: December 21, 2023 ·8 min
Can your pet be hacked? Understanding cybersecurity risks in pet tech
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
Published: August 30, 2023 ·5 min read

Malware

15 types of malware: real-world examples and protection tips
Learn about all the different types of malware, including spyware, adware, trojans, worms, viruses, ransomware, botnets, and more.
Updated: December 20, 2024 ·15 min read
Is your computer haunted? No, it’s probably malware
Your computer isn’t haunted—it’s probably malware. Check out the signs of infection, and how to protect yourself from these digital ghosts.
Updated: October 07, 2024 ·7 min read
What is adware and how do you get rid of the invasive software?
Adware is an invasive malware that floods users with advertisements. Learn how adware can infect your devices—and how to remove it.
Updated: September 30, 2024 ·9 min read
Logic bomb definition, examples, and protection
Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: August 09, 2024 ·7 min read

Kids Safety

What is a no-log VPN? The 7 best no-log VPNs for 2025
Read our guide to learn how no-log VPNs work and discover the 7 best options for browsing the web anonymously in 2025.
Updated: December 20, 2024 ·12 min read
What is a firewall? What it does and why you need it
A firewall is a network security tool that monitors incoming and outgoing traffic to protect against unauthorized access. Learn more.
Updated: December 19, 2024 ·9 min read
Doxxing: What it is and how to protect yourself
Doxxing can threaten your well-being and safety. Learn more about what it is and ways to prevent it.
Updated: December 06, 2024 ·9 min read
What is IPSec and how does this VPN protocol secure your device?
IPSec is a group of encryption protocols that help secure network communications. Learn more here.
Published: December 06, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.