Norton Blog

Malware

Editors' picks

How is AI affecting online dating? How to stay safe
With 59% of people considering using AI as their online dating coach, looking for love is more complicated than ever before.
Published: April 23, 2024 ·6 min read
Are younger generations more susceptible to online scams?
Growing up in a tech-centric world has its drawbacks, and Gen Z is more exposed to cyber threats than ever before.
Published: April 10, 2024 ·3 min read
Norton vs. Malwarebytes: 2024 comparison guide
Choosing the right antivirus is essential if you want to stay safer online. We're going to help you decide between two of the best: Norton vs Malwarebytes.
Published: May 03, 2024 ·8 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web includes hidden sites you can’t find with normal search engines. Learn the pros and cons and how to access it safely.
Published: May 14, 2024 ·10 min read
Identity theft: What is it, how it works, and common warning signs
Identity theft happens when someone steals your personal or financial data. Read our guide to learn more.
Updated: May 21, 2024 ·9 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras (5 methods for detection)
Learn how to find hidden cameras at home, in rentals, and in public.
Updated: June 21, 2024 ·7 min read
Beware of fake charity scams—9 Tips to help protect yourself
Ensure your contributions make a real impact. Learn how to spot charity scams and protect your donations and personal information.
Published: November 20, 2024 ·5 min read
Scam-yourself attacks—How to spot and avoid them
Scammers are getting users to install malware into their devices themselves. Here’s what you need to know to help protect yourself.
Published: November 19, 2024 ·7 min read
Shareware: Types and potential risks
Learn about shareware, including what it is, how it works, different types, and what risks you need to protect yourself from in our guide.
Updated: November 18, 2024 ·10 min read

Most popular in Device Security

What is streaming and how does it work?
Streaming is a method of accessing content via the internet. Read on to learn how streaming works.
Published: November 12, 2024 ·7 min read
How to send an anonymous email
Learn how to send an anonymous email with a VPN, through Tor, or using one of our other proven methods.
Updated: November 12, 2024 ·7 min read
What are cookies? How they work and when to accept them
What are internet cookies? Learn about different cookie types and what they’re used for in our guide.
Updated: November 05, 2024 ·9 min read

Most popular in Device Security

What is a honeypot and how does it work?
Honeypots are cyber traps used to lure hackers away from important assets. Learn about different types of honey pots and how they work.
Updated: September 30, 2024 ·9 min read
Tablets in schools—A parent's guide to data protection
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: September 16, 2024 ·6 min read
Sharenting and knowing when you’ve shared too much
Are you worried about what’s posted about your kids online? Learn about the dangers of sharenting and how to protect your child’s privacy.
Published: September 16, 2024 ·6 min read

Want more?

Follow us for all the latest news, tips and updates.