Cyberthreat

Device Security

Mobile

Most popular in Device Security

What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Is my phone hacked? 5 signs + protection tips
Your phone may be hacked if there is high data usage, lots of pop-ups, new apps you didn’t download, unrecognized outgoing calls, or the battery drains quickly.
Published: July 13, 2023 ·2 min read
Why is my battery draining so fast? 12 reasons + how to fix it
If you've wondered, "Why is my battery draining so fast?" then you know a dying battery can be a pain. Read along to learn about the causes and how to fix them.
Published: December 30, 2022 ·3 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Scammers phishing for information use complex AI tools—you should too
Messages that lure us into revealing personal information to scammers are getting harder to detect, thanks to AI. Genie uses AI to fight back.
Published: February 15, 2024 ·6 min read
Mobile security: What it is and why you need it
Mobile security is the strategy and software that protects mobile devices like phones, tablets, and laptops from hackers, malware, and identity theft.
Updated: January 16, 2024 ·12 min read
What is a third-party app? Examples and potential risks
Third-party apps are apps that you can download onto your smart devices from an app store that wasn’t developed or supported by the operating system maker.
Published: November 13, 2023 ·6 min
How do I get rid of pop-up ads on my phone?
Pop-up ads and alerts are disruptive, and they can be a security risk too. Learn how to get rid of pop-ups on Android and iPhone.
Published: July 20, 2023 ·3 min

Internet of Things

10 IoT vulnerabilities to be aware of + protection tips
From wearables to smart TVs, IoT devices are everywhere. Learn about IoT vulnerabilities, if they're safe, and how to protect yourself.
Published: December 21, 2023 ·8 min
What is a honeypot and how does it work?
Honeypots are cyber traps used to lure and track hackers. Learn more about how honeypots work in cybersecurity and the different types.
Published: October 06, 2023 ·7 min
Can your pet be hacked? Understanding cybersecurity risks in pet tech
Technology has simplified some pet owner responsibilities and can help us keep a closer eye on our furry friends, but could your favorite pet tech gadgets be putting you at risk of cyberthreats?
Published: August 30, 2023 ·5 min read
What is biometrics + is sensor-based security safe?
Biometrics is measurements based on our physical characteristics that can be used for security. Read on to learn more about biometrics and risks to avoid.
Published: August 11, 2023 ·4 min read

Malware

What is a macro virus? + How to remove one
A macro virus is written in the same language used by Excel, Word, and similar programs. Learn how macro viruses work and how to spot them.
Updated: May 13, 2024 ·7 min read
Trojan viruses: Detecting and removing
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: May 08, 2024 ·6 min read
Best antivirus software: 2024 comparison guide
We compare the 9 best antivirus software suites in 2024 so you can choose the best one. Find prices, features, FAQs, and more.
Published: May 03, 2024 ·14 min read
Norton vs. Malwarebytes: 2024 comparison guide
Choosing the right antivirus is essential if you want to stay safer online. We're going to help you decide between two of the best: Norton vs Malwarebytes.
Published: May 03, 2024 ·8 min read

Kids Safety

What is MD5 hash + how does it work?
The MD5 hashing algorithm is a cryptographic protocol used to authenticate messages. Learn about MD5 hash and how it works.
Published: May 17, 2024 ·7 min read
How to delete your X (formerly Twitter) account
Need to delete your X (formerly Twitter) account? Our guide offers step-by-step instructions for both mobile and desktop users.
Published: May 15, 2024 ·5 min read
VPN protocols: 7 types and comparisons
VPN protocols govern how data is transmitted between a device and a VPN server. Learn about the types and how they work.
Published: May 13, 2024 ·8 min read
What is incognito mode and how do you use it?
Use incognito mode to make your browsing experience more private and help stop your device from storing data.
Updated: April 16, 2024 ·8 min read

Want more?

Follow us for all the latest news, tips and updates.