Cyberthreat

Device Security

Mobile

Most popular in Device Security

What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
Why is my battery draining so fast? 12 reasons + how to fix it
If you've wondered, "Why is my battery draining so fast?" then you know a dying battery can be a pain. Read along to learn about the causes and how to fix them.
Published: December 30, 2022 ·3 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Why does my phone get hot? 7 tips to avoid overheating
Why does my phone get hot? Phone overheating is often the result of overworking the battery or processor.
Updated: August 28, 2024 ·9 min read
How to turn off a VPN on an iPhone (3 simple options)
Safely disconnect your VPN on iPhone using our easy-to-follow instructions and learn about some of the common reasons you might need to disable your VPN.
Published: August 14, 2024 ·6 min read
Android vs iPhone security: which is safer?
Discover the differences in Android vs iPhone security. Learn which devices and operating systems are safest and most secure before you buy.
Updated: June 28, 2024 ·9 min read
Can iPhones get hacked? Yes, and 8 ways to fix it
Learn how iPhones can get hacked, signs to know if your iPhone’s been hacked, and how to fix the issue.
Published: June 28, 2024 ·14 min read

Internet of Things

What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Off the beaten track—How to choose a GPS for hiking safety
Ready to embark on your next hiking adventure? A GPS tracker may help you stay safe and connected while exploring nature.
Published: August 28, 2024 ·6 min read
10 IoT vulnerabilities to be aware of + protection tips
From wearables to smart TVs, IoT devices are everywhere. Learn about IoT vulnerabilities, if they're safe, and how to protect yourself.
Published: December 21, 2023 ·8 min
Can your pet be hacked? Understanding cybersecurity risks in pet tech
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
Published: August 30, 2023 ·5 min read

Malware

Is your computer haunted? No, it’s probably malware
Your computer isn’t haunted—it’s probably malware. Check out the signs of infection, and how to protect yourself from these digital ghosts.
Updated: October 07, 2024 ·7 min read
What is adware and how do you get rid of the invasive software?
Adware is an invasive malware that floods users with advertisements. Learn how adware can infect your devices—and how to remove it.
Updated: September 30, 2024 ·9 min read
Logic bomb definition, examples, and protection
Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: August 09, 2024 ·7 min read
What to do if a scammer has your email address – 8 tips
What should you do if a scammer has your email address? Find out if scammers have hacked your email account and what they can do with your email address.
Updated: July 12, 2024 ·8 min read

Kids Safety

What is a VPN tunnel and how does it work?
A VPN tunnel is the encrypted connection between your device and a server. Learn how to make your VPN tunnel more secure.
Updated: September 30, 2024 ·7 min read
What is TCP/IP and how does it work?
TCP/IP is a suite of protocols that enables communication between systems and devices across networks. Learn how it works.
Published: September 30, 2024 ·5 min read
What can someone do with your IP address?
Learn what someone can do with your IP address plus how to protect your IP from cybercriminals.
Published: September 30, 2024 ·7 min read
Is Temu safe? Checking out this popular shopping app
Is Temu legit? Some say yes, but there are some things you should know before you download the app.
Published: September 30, 2024 ·5 min read

Want more?

Follow us for all the latest news, tips and updates.