Device Security


Most popular in Device Security

Try Norton 360 FREE 30-Day Trial*

30 days of FREE* comprehensive antivirus, device security, and online privacy.

Join today. Cancel anytime.

*Terms Apply

Start Free Trial


What is bluejacking? Definition + protection tips

What is bluejacking?


Bluejacking is a Bluetooth attack in which a hacker spams your device with unsolicited phishing messages.

June 19, 2023·3 min
Why is my battery draining so fast? 12 reasons + how to fix it

Why is my battery draining so fast?


Your battery may be draining quickly either from you using a lot of its energy or from settings or issues that can cause your device to burn through its battery life inefficiently.  

December 29, 2022·3 min read
VPN for Android

Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.

August 08, 2018·3 min read
What is juice jacking? Think twice before using public USB ports

Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.

August 07, 2018·4 min read

Internet of Things

What is a honeypot? How it is used in cyber security?

A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.

August 01, 2022·3 min read
What is the Internet of Things?

The Internet of Things is a growing system of billions of devices — or things — worldwide. They connect to the internet and each other through wireless networks.

June 12, 2022·3 min read
12 tips to help secure your smart home and IoT devices

Hot new gadgets make your home smarter and sometimes vulnerable. Here’s how to secure your smart home and your IoT devices.

August 28, 2019·4 min read
Share your Wi-Fi without sharing your password

The security of your home Wi-Fi connection is serious cause for concern. With the proliferation of IoT devices, the home network is bombarded with malware. 7 in 10 consumers wish their home network were more secure, but only 27% believe their network will be compromised. A guest network has the advantage of having its own password.

August 08, 2018·4 min read


Website spoofing: What to know about counterfeit domain names

Website spoofing, aka domain spoofing, occurs when a scammer mimics the website of a trusted company with the goal of stealing visitors' personal information.

February 08, 2022·3 min read
9 simple webcam security tips to deter hackers

Most devices have a camera these days. So we’re sharing nine easy ways to increase your webcam security and keep yourself safe.

June 19, 2020·4 min read
Malvertising: What is it and how to avoid it

Malvertising can infect your computer with malicious software even when visiting legitimate sites. Here’s how.

August 08, 2018·2 min read
7 tips to prevent ransomware

Ransomware extorts money from victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking someone into installing it. It typically scores high profile victims like hospitals, public schools and police departments.

January 18, 2018·3 min read


Tor vs. VPN: What's the difference + which is safest?

For those wary of nosy websites or hackers, many people use Tor and VPNs for protection. To learn more about each tool, follow this Tor vs. VPN breakdown.

September 06, 2022·4 min read
What is blockchain security? An overview

Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.

June 24, 2022·4 min read
How to make Facebook private: 9 ways to boost your privacy on Facebook

Here's help in how to make Facebook private. You can boost your privacy on Facebook with some simple steps. Here are our suggestions for sharing a bit less on your Facebook timeline.

January 31, 2022·4 min read
Blockchain security: How safe blockchain really is

How safe is blockchain technology? Here, we overview the term, plus blockchain security threats and best practices to avoid them.

July 26, 2021·4 min read

Want more?

Follow us for all the latest news, tips and updates.