5 mobile security threats you can protect yourself from
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Explore topics
30 days of FREE* comprehensive antivirus, device security, and online privacy.
Join today. Cancel anytime.
*Terms Apply
If you have a cell phone, you've probably noticed it's sometimes hot to the touch. There are many reasons why this happens—we’ve put together a guide to why phones get hot and how to protect it.
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Mobile ransomware is a form of malware that steals sensitive data or locks a device and then demands payment before returning the data or unlocking the device.
The Internet of Things is a growing system of billions of devices — or things — worldwide. They connect to the internet and each other through wireless networks.
Facial recognition is a way of recognizing a human face through technology. A facial recognition system uses biometrics to map facial features from a photograph or video. It compares the information with a database of known faces to find a match.
Cyber security helps protect your devices, data, identity, home network, and privacy — because it’s all connected. Learn how.
Smart tvs have become a favorite entertainment device as prices have decreased and quality has increased. They offer the convenience of a one-stop shop for your streaming services like Netflix, Hulu, Chromecast, Amazon Prime, and more. Smart TVs have their pros and cons. Find out the advantages and risks associated with smart TVs.
Learn what to do if your email account has been hacked so you can stop scammers from targeting your contact list with money scams, malware, and more.
You're never too small to be the target of a ransomware attack. Learn tips for small business owners.
Ransomware is a form of malicious software that locks and encrypts a victim’s computer or device data, then demands a ransom to restore access. In many cases, the victim must pay the cybercriminal within a set amount of time or risk losing access forever. If the attackers don’t give you the decryption key, you may be unable to regain access to your data or device.
Fileless malware uses your system’s software, applications and protocols to install and execute malicious activities. Learn more.
A VPN can help you achieve more online privacy by masking your browsing activity from eavesdroppers, your ISP, and others. VPNs encrypt your connection to provide more security when you’re on public Wi-Fi networks in places like coffee shops and airports.
Getting cyber smart starts with cyber hygiene. Here are tips and strategies to help keep you and your family Cyber Safe.
Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.
Recovering deleted internet history can be straightforward. Here’s help recovering your deleted internet history data.
Want more?
Follow us for all the latest news, tips and updates.