Cyberthreat

Device Security

Mobile

Most popular in Device Security

What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
Why is my battery draining so fast? 12 reasons + how to fix it
If you've wondered, "Why is my battery draining so fast?" then you know a dying battery can be a pain. Read along to learn about the causes and how to fix them.
Published: December 30, 2022 ·3 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Android vs iPhone security: which is safer?
Discover the differences in Android vs iPhone security. Learn which devices and operating systems are safest and most secure before you buy.
Updated: June 28, 2024 ·9 min read
Can iPhones get hacked? Yes, and 8 ways to fix it
Learn how iPhones can get hacked, signs to know if your iPhone’s been hacked, and how to fix the issue.
Published: June 28, 2024 ·14 min read
How to use a VPN on an iPhone or iPad in 2024
Learn how to use a VPN on an iPhone and iPad. Discover what a VPN is and how to get one on iOS devices.
Published: June 26, 2024 ·11 min read
Why is my phone so slow? 7 reasons (+ tips to speed it up)
Discover why your phone is running slowly and find solutions to speed up your device. Learn about common issues and how to fix them in this guide.
Published: May 22, 2024 ·9 min read

Internet of Things

10 IoT vulnerabilities to be aware of + protection tips
From wearables to smart TVs, IoT devices are everywhere. Learn about IoT vulnerabilities, if they're safe, and how to protect yourself.
Published: December 21, 2023 ·8 min
What is a honeypot and how does it work?
Honeypots are cyber traps used to lure and track hackers. Learn more about how honeypots work in cybersecurity and the different types.
Published: October 06, 2023 ·7 min
Can your pet be hacked? Understanding cybersecurity risks in pet tech
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
Published: August 30, 2023 ·5 min read
What is biometrics + is sensor-based security safe?
Biometrics is measurements based on our physical characteristics that can be used for security. Read on to learn more about biometrics and risks to avoid.
Published: August 11, 2023 ·4 min read

Malware

What to do if a scammer has your email address – 8 tips
What should you do if a scammer has your email address? Find out if scammers have hacked your email account and what they can do with your email address.
Updated: July 12, 2024 ·8 min read
Is my phone hacked? 5 warning signs + protection tips
Common signs of phone hacking include high data usage, lots of pop-ups, new apps you didn’t download, strange outgoing calls, or a draining battery.
Updated: June 21, 2024 ·9 min read
What is a macro virus? + How to remove one
A macro virus is written in the same language used by Excel, Word, and similar programs. Learn how macro viruses work and how to spot them.
Updated: May 13, 2024 ·7 min read
Trojan viruses: Detecting and removing
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: May 08, 2024 ·6 min read

Kids Safety

What is private browsing? How to use it on any browser
Learn what private browsing is and how to use it on popular browsers to keep your online activity hidden from others.
Updated: June 28, 2024 ·9 min read
What is cloud security? Benefits & best practices
Cloud security refers to the guidelines to protect data and applications stored in the cloud. Learn more about cloud security and best practices.
Updated: June 26, 2024 ·12 min read
How to tell if your phone is tapped and what to do if it is
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Updated: June 25, 2024 ·13 min read
What is an IP address?
An IP address lets your device connect to the internet. Learn how to find yours and how to hide it from others who might be snooping around.
Updated: June 23, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.