Norton Blog

Malware

Editors' picks

How is AI affecting online dating? How to stay safe
With 59% of people considering using AI as their online dating coach, looking for love is more complicated than ever before.
Published: April 23, 2024 ·6 min read
Are younger generations more susceptible to online scams?
Growing up in a tech-centric world has its drawbacks, and Gen Z is more exposed to cyber threats than ever before.
Published: April 10, 2024 ·3 min read
Norton vs. Malwarebytes: 2024 comparison guide
Choosing the right antivirus is essential if you want to stay safer online. We're going to help you decide between two of the best: Norton vs Malwarebytes.
Published: May 03, 2024 ·8 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web includes hidden sites you can’t find with normal search engines. Learn the pros and cons and how to access it safely.
Published: May 14, 2024 ·10 min read
Identity theft: What is it, how it works, and common warning signs
Identity theft happens when someone steals your personal or financial data. Read our guide to learn more.
Updated: May 21, 2024 ·9 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras (5 methods for detection)
Learn how to find hidden cameras at home, in rentals, and in public.
Updated: June 21, 2024 ·7 min read
Is your computer haunted? No, it’s probably malware
Your computer isn’t haunted—it’s probably malware. Check out the signs of infection, and how to protect yourself from these digital ghosts.
Updated: October 07, 2024 ·7 min read
Election scams—Donations, surveys, and voter registration
Election season is here. Check out how you can avoid election scams to help protect your information, money, and vote.
Published: October 02, 2024 ·5 min read
4 Easy tips you need this Cybersecurity Awareness Month
Here are the four key steps with easy action items for Cybersecurity Awareness Month, plus a bonus task to help you protect yourself from identity theft this year.
Published: October 01, 2024 ·6 min read

Most popular in Device Security

What is a VPN tunnel and how does it work?
A VPN tunnel is the encrypted connection between your device and a server. Learn how to make your VPN tunnel more secure.
Updated: September 30, 2024 ·7 min read
Is Temu safe? Checking out this popular shopping app
Is Temu legit? Some say yes, but there are some things you should know before you download the app.
Published: September 30, 2024 ·5 min read
What is TCP/IP and how does it work?
TCP/IP is a suite of protocols that enables communication between systems and devices across networks. Learn how it works.
Published: September 30, 2024 ·5 min read

Most popular in Device Security

What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Sharenting and knowing when you’ve shared too much
Are you worried about what’s posted about your kids online? Learn about the dangers of sharenting and how to protect your child’s privacy.
Published: September 16, 2024 ·6 min read
Tablets in schools—A parent's guide to data protection
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: September 16, 2024 ·6 min read

Want more?

Follow us for all the latest news, tips and updates.