Norton Blog

Online Scams

Editors' picks

11 types of Facebook Marketplace scams and what to do if you fall for one
Learn about the most common Facebook Marketplace scams and how to protect yourself as a buyer or seller.
Updated: August 13, 2024 ·11 min read
How does Spotify Wrapped work and what data do they collect?
How does Spotify Wrapped work? Discover the secret to the music app’s insights and learn whether your data is secure.
Published: December 05, 2024 ·5 min read
How to spot counterfeit websites when holiday shopping
Before holiday shopping, learn how to spot counterfeit websites and avoid deals that are too good to be true.
Published: December 03, 2024 ·5 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web includes hidden sites you can’t find with normal search engines. Learn the pros and cons and how to access it safely.
Published: May 14, 2024 ·10 min read
Identity theft: What is it, how it works, and common warning signs
Identity theft happens when someone steals your personal or financial data. Read our guide to learn more.
Updated: May 21, 2024 ·9 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras (5 methods for detection)
Learn how to find hidden cameras at home, in rentals, and in public.
Updated: June 21, 2024 ·7 min read
Ransomware protection: What it is and how to protect yourself
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: December 31, 2024 ·14 min read
What is spoofing? 12 examples of different spoofing attacks
Spoofing is the act of falsifying information to impersonate a trusted source, often to steal data or money. Learn more about spoofing here.
Published: December 30, 2024 ·14 min read
Malvertising: What it is and how to prevent it
Malvertising is the combination of malware and advertising. Find out how to prevent it and stay safe online.
Updated: December 27, 2024 ·8 min read

Most popular in Device Security

Proxy vs. VPN: What’s the difference and which one should you use?
Learn the differences between VPN vs. proxy to see how they keep your internet activity more private.
Updated: December 31, 2024 ·9 min read
What is a no-log VPN? The 7 best no-log VPNs for 2025
Read our guide to learn how no-log VPNs work and discover the 7 best options for browsing the web anonymously in 2025.
Updated: December 20, 2024 ·12 min read
WEP, WPA, WPA2, and WPA3: Definitions and comparison
WEP and WPA are both wireless network security protocols. Learn the differences between the two protocols and which is better.
Published: December 19, 2024 ·9 min read

Most popular in Device Security

What is the Internet of Things? Learn what it means, examples, and more
The IoT (Internet of Things) is a system of billions of devices that communicate through the internet. Read on to learn more.
Updated: December 27, 2024 ·9 min read
iPhone parental controls: 9 tips to keep your kids safer
These iPhone parental controls can help you manage your kids' online activities and keep them safer.
Published: December 27, 2024 ·11 min read
What is firmware? Different types and how to update it
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: December 23, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.