Security Tips

Is Etsy legit? 9 Etsy scams to avoid
Is Etsy legit? Learn about 9 Etsy scams to watch out for and shop online more safely.
Updated: April 14, 2025 · 16 min read
11 strategies on how to stop spam emails from clogging your inbox
Declutter your digital life. Learn how to stop spam from clogging your Gmail, Outlook, or other email client.
Updated: April 04, 2025 · 15 min read
RFID blocking: What it is, how it works, and why you may need it
RFID blocking is meant to protect your bank cards from unauthorized scanning, but does it work? Find out here.
Published: March 14, 2025 · 9 min read
Is AliExpress legit? Counterfeits, scams, and more
Learn about the major risks of shopping on AliExpress and some tips for avoiding scams.
Published: February 10, 2025 · 11 min read
15 Work-from-home security tips for remote workers
Follow our top work-from-home security tips to help protect your devices, networks, and data.
Published: January 28, 2025 · 8 min read
The top social media threats of 2025
Learn how to better protect your accounts from the top social media threats of 2025 and beyond.
Updated: January 14, 2025 · 13 min read
Do my apps truly need to have so much access to work?
Curious about app permissions to avoid in 2025? Discover best practices for digital safety.
Published: January 08, 2025 · 6 min read
How to remove a Windows Defender security warning scam
Learn what fake Windows Defender security warnings are, how to spot the scam, and how you can protect yourself.
Published: December 19, 2024 · 8 min read
Don't let holiday cyberattacks spoil your festivities
Learn about common holiday cyberattacks and simple steps to help protect yourself from digital threats this season.
Published: December 18, 2024 · 5 min read
How to spot counterfeit websites when holiday shopping
Before holiday shopping, learn how to spot counterfeit websites and avoid deals that are too good to be true.
Published: December 03, 2024 · 5 min read
Cyber Monday safety tips for online shopping in 2024
Here’s help for protecting against Cyber Monday scams in 2024. Shop safely online and avoid having your holiday spoiled by fraud.
Updated: November 28, 2024 · 4 min read
Is TikTok Shop legit? How to shop safely on social media
TikTok Shop is generally safe to use but it has its fair share of scams—learn what to look out for.
Published: November 26, 2024 · 5 min read
What is spam? 6 types of spam messages and how to avoid them
Spam is an unsolicited, unwanted, annoying, and sometimes scammy message. Learn how to stop spam here.
Published: November 22, 2024 · 13 min read
Scam-yourself attacks—How to spot and avoid them
Scammers are getting users to install malware into their devices themselves. Here’s what you need to know to help protect yourself.
Published: November 19, 2024 · 7 min read
Secure your holiday shopping on Cyber Safety Sunday
Check out these Cyber Safety tips to help protect you while you shop online.
Updated: November 15, 2024 · 6 min read
4 Easy tips you need this Cybersecurity Awareness Month
Here are the four key steps with easy action items for Cybersecurity Awareness Month, plus a bonus task to help you protect yourself from identity theft this year.
Published: October 01, 2024 · 6 min read
Is Temu safe? Checking out this popular shopping app
Is Temu legit? Some say yes, but there are some things you should know before you download the app.
Published: September 30, 2024 · 5 min read
10 Tips to help hack-proof your dorm room
College campuses are one of the best places for cybercriminals to target students. Take these steps to help hack-proof your personal space.
Updated: September 26, 2024 · 7 min read
The new face of cyber threats—AI, deepfakes, and scams
Gen Threat Labs researchers reported that scammers have been exceedingly active, innovating new techniques and exploiting AI capabilities.
Published: September 04, 2024 · 6 min read
Is your money safe? 8 secure ways to pay bills online
Paying bills online is convenient and safe—for the most part. Let’s dive into different online payment options to see how safe they are.
Updated: August 05, 2024 · 7 min read
Android vs iPhone security: which is safer?
Discover the differences in Android vs iPhone security. Learn which devices and operating systems are safest and most secure before you buy.
Updated: June 28, 2024 · 9 min read
What is cloud security? Benefits & best practices
Cloud security refers to the guidelines to protect data and applications stored in the cloud. Learn more about cloud security and best practices.
Updated: June 26, 2024 · 12 min read
What is MD5 hash + how does it work?
The MD5 hashing algorithm is a cryptographic protocol used to authenticate messages. Learn about MD5 hash and how it works.
Published: May 21, 2024 · 7 min read
Best antivirus software: 2024 comparison guide
We compare the 9 best antivirus software suites in 2024 so you can choose the best one. Find prices, features, FAQs, and more.
Published: May 03, 2024 · 14 min read
Norton vs. Malwarebytes: 2024 comparison guide
Choosing the right antivirus is essential if you want to stay safer online. We're going to help you decide between two of the best: Norton vs Malwarebytes.
Published: May 03, 2024 · 8 min read
You’ve created your business, now what about IT?
You’ve got a lot to deal with when you’re running your own business. Make sure protecting your digital assets isn’t an afterthought.
Published: April 23, 2024 · 4 min read
How to file taxes online safely + tips
Learn how to file taxes online safely by following these steps. The goal is to keep your personal and financial information private when filing your taxes.
Updated: March 25, 2024 · 3 min read
DDoS? Botnet? 2FA? What does it all mean? We can explain
Sometimes we get a little caught up in the verbiage of Cyber Safety. Despite the language of the trade, the concepts are actually easy to understand.
Published: March 20, 2024 · 4 min read
How to encrypt email in Gmail, Outlook, iOS, and Android
Learn how to encrypt email in Gmail, Outlook, iOS, and Android devices using this guide. We’ll also teach you how to keep your email safer and more secure.
Updated: February 23, 2024 · 9 min read
What your favorite red-carpet look says about your cybersecurity habits
What if red-carpet threads could say something about one’s cybersecurity practices? What would your favorite look be and what would it say about your cyber habits?
Published: February 08, 2024 · 5 min read
Norton's playbook for a Cyber Safe playoff season
It’s time for playoff football! As the teams' prep for battle on the gridiron, you should be preparing your own digital defenses.
Published: January 31, 2024 · 7 min read
Cybercriminals: Who they are and how to protect yourself
Cybercriminals use computers to commit a wide variety of crimes. Uncover common types of cybercrimes, their impact, and protection strategies.
Published: January 22, 2024 · 10 min read
Mobile security: What it is and why you need it
Mobile security is the strategy and software that protects mobile devices like phones, tablets, and laptops from hackers, malware, and identity theft.
Updated: January 16, 2024 · 12 min read
10 IoT vulnerabilities to be aware of + protection tips
From wearables to smart TVs, IoT devices are everywhere. Learn about IoT vulnerabilities, if they're safe, and how to protect yourself.
Published: December 21, 2023 · 8 min
How to choose antivirus software
Learn how to choose the best antivirus software to fit your needs with our expert tips in this guide. Protect your device with the right security software.
Published: December 06, 2023 · 10 min read
Cryptography Definition, Algorithm Types, and Attacks
Cryptography encrypts messages by turning them into “ciphertext” but hackers may exploit flaws to release private data—learn how to protect your communications.
Published: November 27, 2023 · 7 min
How to check if a website is safe: an 11-step guide
Learn how to tell if a website is safe with our guide. By understanding what to look out for, you can protect your personal information and browse securely.
Published: November 23, 2023 · 11 min
Software piracy: Types, risks, and how to stay safe
Software piracy may be easier to commit than you think, often unintentionally. Learn about the types and the dangers so you can stay safe.
Published: November 04, 2023 · 9 min
We’re celebrating a special crime-fighting icon with some hero-level digital tools
If you were a crime-fighting icon, what tools would you carry in your utility belt to stay Cyber Safe? We’ve got a few ides.
Published: September 15, 2023 · 2 min read
Do tablets and smartphones need security software?
Tablets and smartphones can be vulnerable to online threats and need security software
Published: September 01, 2023 · 2 min read
COVID-19 and new device security: 9 tips to help stay cybersafe
If you just purchased a new device in the COVID-19 era, there are steps you can take to help set up and maintain its security. | NortonLifeLock
Published: September 01, 2023 · 2 min read
Working from home on your own computer: 12 security tips in the COVID-19 era
Many companies were unprepared to have employees work from home due to the coronavirus outbreak. These security steps can help.
Published: September 01, 2023 · 4 min read
What Is cyber security? What you need to know
Cyber security is the state or process of protecting and recovering networks, devices and programs from any type of cyberattack. Learn more.
Published: September 01, 2023 · 4 min read
Privacy vs. security: What’s the difference?
Privacy relates to any rights you have to control your personal information. Security refers to how your personal information is protected. Some people regard privacy and security as pretty much the same thing, but they aren’t the same, and knowing how they differ may help you to protect yourself in an increasingly connected world.
Published: September 01, 2023 · 2 min read
Cybersecurity basics for beginners: 2024 guide
Protect yourself online by familiarizing yourself with these cybersecurity basics, like types of cyberattacks and cybersecurity best practices to follow.
Published: July 18, 2023 · 2 min read
23 cloud security risks, threats, and best practices to follow
Cloud security risks include data breaches, insufficient access management, malware infections, and more. Learn how to better protect your data in the cloud.
Published: July 11, 2023 · 7 min read
Cybercrime outlook 2023: It’s all about the economy
Norton Labs released their 2023 cybersecurity predictions. See how the economy is expected to have an impact on cybercrime next year.
Published: January 01, 2023 · 4 min read
Bluetooth security risks to know (and how to avoid them)
Plenty of devices use Bluetooth. But is it safe? To find out, read this Bluetooth security guide to learn more about its risks and how you can safely use it.
Published: October 03, 2022 · 3 min read
The risks of rooting your Android phone
Some people talk about the freedom rooting your phone gives you, without stressing the risks. Here’s an overview of the advantages and disadvantages of this process.
Published: September 21, 2022 · 4 min read
115 cybersecurity statistics and trends to know
Explore these 115 cybersecurity statistics to understand the latest cybercrime rates and cybersecurity trends currently shaping the hacking industry.
Published: September 02, 2022 · 3 min read
Q&A: Is It safe to sign in with Google or Facebook?
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Published: August 25, 2022 · 4 min read
What is blockchain security? An overview
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Published: June 24, 2022 · 4 min read
Cryptocurrency security guide + 9 crypto protection tips
Follow these cryptocurrency security measures to help protect your crypto investments.
Published: May 26, 2022 · 4 min read
Email security: A definition + email protection tips
Use this email security guide to learn about the importance of email protection, how to make your email more secure, and how to help yourself avoid common email security threats.
Published: May 20, 2022 · 4 min read
Personal cybersecurity resolutions for 2022: A month-to-month guide
Elevate your personal cybersecurity this year with this month-to-month guide on how to adopt cybersecurity best practices over time, plus pointers for how to help prevent a cyberattack.
Published: January 23, 2022 · 4 min read
What is data security? An overview + 10 data protection strategies
What is data security? Consider this your go-to guide for all things data security, including data security risks and data protection tips to look out for.
Published: December 17, 2021 · 4 min read
Data loss prevention: What is DLP + how does it work?
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
Published: November 10, 2021 · 2 min read
IoT device security: An ultimate guide for securing your new tech
How do you help improve the security of IoT devices? Follow these IoT device security best practices to help make your gadgets more Cyber Safe.
Published: November 08, 2021 · 3 min read
Holiday cybercrime statistics + tips to protect against threats
Holiday cybercrime statistics are hard to break out, but it’s fair to say some cybercrimes are known to appear around holidays. Here’s what you need to know.
Published: October 18, 2021 · 4 min read
Q&A: Should I let a merchant email my receipt or should I be suspicious?
Email receipts have several pros, but you may worry about your privacy when handing over your email address at the checkout. Get advice here.
Published: September 17, 2021 · 3 min read
Q&A: How do I know if clicking on those unsubscribe links is safe?
Scammers sometimes use fake emails with a phony "unsubscribe" link at the bottom. Learn how to unsubscribe safely. | Norton
Published: June 15, 2021 · 4 min read
Good cyber hygiene habits to help stay safe online
Cyber hygiene involves using products and tools that fit your needs, performing hygienic tasks correctly, and starting a routine.
Published: January 23, 2021 · 3 min read
11 security steps to take after unboxing your new devices
Before your new tech gadget becomes part of your day-to-day life, here’s what you need to know about helping to assure privacy and security.
Published: January 14, 2021 · 4 min read
How to secure your iPad and keep it that way
How to maximize security and privacy while you enjoy convenience and entertainment with your iPad, wherever you happen to be.
Published: January 14, 2021 · 3 min read
How to secure your Android phone or tablet
Help protect your Android device by adjusting the security settings for your device and your apps, and more.
Published: January 14, 2021 · 2 min read
How to stay safer online: Your 2025 online privacy and device security checklist
Take these 10 steps to help protect your online privacy and device security.
Published: December 04, 2020 · 3 min read
Your must-know guide to new tech set up and device security
Getting one of those top tech gifts over the holidays in 2020? Learn new device security best practices and set up pointers.
Published: November 19, 2020 · 4 min read
How to safely donate your old laptop, smartphone and other tech gadgets
Donating your old smartphone, laptop, or tablet is a way to help a person or organization in need. Learn how to do it safely.
Published: November 19, 2020 · 3 min read
11 ways to help protect yourself against cybercrime
Cybercrime is any crime that takes place online or primarily online. Cybercriminals often commit crimes by targeting computer networks or devices. Other cybercrimes include things like “revenge porn,” cyber-stalking, bullying, and child sexual exploitation.
Published: August 15, 2020 · 2 min read
What is RFID and why does it matter?
RFID is a type of Automatic Identification and Data Capture technology. Uses include contactless payments and tracking inventory.
Published: June 25, 2020 · 4 min read
12 tips to help secure your smart home and IoT devices
Hot new gadgets make your home smarter and sometimes vulnerable. Here’s how to secure your smart home and your IoT devices.
Published: August 28, 2019 · 4 min read
7 most important cyber safety topics you should learn about
Discover the 7 most important cyber safety topics you should learn about from the Norton blog. Click to read more.
Published: April 26, 2019 · 2 min read
Is jailbreaking legal and safe?
Jailbreaking is the process by which Apple users remove software restrictions imposed on iOS and Apple products like the iPad®, iPhone, iPod®, and more. It lets users install applications, extensions, and other software applications that are not authorized by Apple’s App Store. If something goes wrong with your jailbroken iPhone, Apple says, it’s up to you to fix it.
Published: March 22, 2019 · 4 min read
Internet of Things (IoT) security: 9 ways you can help protect yourself
IoT security is the safety component tied to the Internet of Things. It focuses on protecting your internet-enabled devices that connect to each other on wireless networks.
Published: February 06, 2019 · 4 min read
How to live more securely in a connected world: If You Connect It, Protect It
National Cybersecurity Awareness Month — also known as NCSAM — has online security advice for you in October.
Published: October 08, 2018 · 4 min read
3 steps to take immediately if your phone is stolen or lost
3 steps to take immediately if your phone is stolen or lost
Published: August 31, 2018 · 2 min read
The evolution of Norton™ 360: A brief timeline of cyber safety
The evolution of Norton 360 : A brief timeline of cyber security
Published: August 08, 2018 · 2 min read
Remote computer access: What is it and what are the risks?
Learn how remote computer access works, the possible security risks, and how you can access other computers and networks remotely.
Published: August 08, 2018 · 4 min read
PC or Mac: Which is more resistant to cyber threats?
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who dont care if you prefer PC to Mac or vice versa. There...
Published: August 08, 2018 · 3 min read
Video conferencing risks when working at home: 16 ways to avoid them
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
Published: August 08, 2018 · 2 min read
2020 Election Cybersecurity: Protecting U.S. elections against cybercrime
The 2020 U.S. elections face major cybersecurity threats. Learn what they are and what the U.S. is doing to protect elections from hacking.
Published: August 08, 2018 · 4 min read
From the break room to the boardroom: Creating a culture of cybersecurity in the workplace
Whether you own a small business or a big one, you live in a world where cybersecurity is of paramount importance. Big business, small business, academic institutions, government agencies,...
Published: August 08, 2018 · 2 min read
Chrome Zero Day Vulnerability - Why You Should Update Google Chrome Immediately
Click here to learn about the Google Chrome Zero Day vulnerability and why you should update your browser. Read on to learn more.
Published: August 08, 2018 · 2 min read
Cyber safety for women
An unfortunate number of women are becoming victims of cyber crimes....
Published: August 08, 2018 · 3 min read
Cyber Safety gift guide 2019: 5 great device-security and online-privacy gifts
If you’re concerned about online security and privacy, here are some gift ideas that can help keep you safer.
Published: August 08, 2018 · 2 min read
Cyber safety guide: Tips to Own IT. Secure IT. Protect IT.
Learn how your actions can impact online privacy and device security. Here’s help during National Cyber Safety Awareness Month and beyond.
Published: August 08, 2018 · 4 min
25 Mac security tips and settings
Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.
Published: August 08, 2018 · 4 min read
Top 5 cybercrimes in the U.S., from the Norton Cyber Security Insights Report
The Norton Cyber Security Insights Report announces the top 5 cybercrimes in America
Published: August 08, 2018 · 4 min read
Home security camera and doorbells: tips to help secure your devices
Hackers can set their sights on Ring and other home security cameras, and that has made some customers feel less than secure.
Published: August 08, 2018 · 2 min read
Cybersecurity tips for small businesses
When you own a small business, it's crucial invest in the best internet security software for your business as well as educate your employees
Published: August 08, 2018 · 2 min read
26 iPhone security tips for iOS 13
Learn about Apple iOS 13. Find out tips and tricks to help secure your device, your data, and your password usage.
Published: August 08, 2018 · 2 min read
8 cyber security tips for business travelers
Whether youre a regular business traveler, or a high-tech adventurer seeker, travelingparticularly abroadposes unique cyber security threats. Business travelers are especially vulnerable because...
Published: August 08, 2018 · 4 min read
12 iPhone security tips for iOS 12
This year, we welcomed iOS 12. This is a time of great excitement for iPhone users. with all these new enhancements, it’s important to keep in mind that these new features may help or hinder your security and privacy. Here are some tips and tricks to help secure your device, your data, and your password usage.
Published: August 08, 2018 · 2 min read
5 mobile security threats you can protect yourself from
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Published: August 08, 2018 · 4 min read
What is a smart TV and the privacy risks of a smart TV
Smart tvs have become a favorite entertainment device as prices have decreased and quality has increased. They offer the convenience of a one-stop shop for your streaming services like Netflix, Hulu, Chromecast, Amazon Prime, and more. Smart TVs have their pros and cons. Find out the advantages and risks associated with smart TVs.
Published: August 08, 2018 · 2 min read
Securing your game console and gaming account
Todays gaming consoles are independent computers, but they are not yet at the stage where they are susceptible to malware in the same way PCs and other devices are. Even though the consoles are...
Published: August 07, 2018 · 3 min read
10 critical steps to help protect yourself online
Learn how to stay safer online with tips on updates, backups, public Wi-Fi, protecting personal information, and more.
Published: August 07, 2018 · 4 min read
What is juice jacking? Think twice before using public USB ports
Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.
Published: August 07, 2018 · 4 min read
Smart watches and internet security: Are my wearables secure?
Find out if your smart watch is safe or if it makes you a target for cybercriminals?
Published: August 07, 2018 · 4 min read
What are some of the laws regarding internet and data security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.
Published: January 18, 2018 · 3 min read

Want more?

Follow us for all the latest news, tips and updates.