Cyberthreat

Device Security

Mobile

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published: August 08, 2018 ·3 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published: August 08, 2018 ·2 min read
What to do when a device is lost or stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Published: August 08, 2018 ·4 min read
Three easy steps to protect your Android
Android phones appear to be the most vulnerable to malware because of the openness of the platform. The flexibility that makes for so many awesome apps has the slight downside of leaving Androids open to some security vulnerabilities.
Published: August 08, 2018 ·2 min read

Internet of Things

Keep your smartphone safe when using it with a connected device hub
Smartphones have become the new norm. In a world of constant connectivity, smartphones are like little personal assistants, keeping us on top of our work and social schedules, enabling us to chart our health, browse the latest news, and access thousands of powerful apps.
Published: August 08, 2018 ·2 min read
Connected toys and what you need to know about them
The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.
Published: August 08, 2018 ·2 min read
Mobile fitness trackers may be one step away from hacks
Wearable health tracking devices and apps unfortunately feature multiple vulnerabilities hackers can exploit to gain access to your personal information.
Published: August 08, 2018 ·4 min read
4 steps to make your smart home more security smart
IoT is an acronym for the Internet of Things. And any device that can connect to the Internet and transmit or receive data can be considered a smart thing. That includes smart homes, also known...
Published: January 29, 2019 ·2 min read

Malware

Webcam hacking
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Published: August 08, 2018 ·4 min read
What is cryptojacking? How it works and how to help prevent it
Cryptojacking is the unauthorized use of your computer and devices by cybercriminals in order to mine for cryptocurrency.
Published: August 08, 2018 ·3 min read
What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published: August 08, 2018 ·4 min read
Ransomware: 5 dos and don'ts
Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...
Published: August 08, 2018 ·3 min read

Privacy

VPN for Mac
Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.
Published: August 07, 2018 ·4 min read
Software terms of service and privacy policies explained
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.
Published: August 08, 2018 ·3 min read
Online Christmas shopping: Naughty or nice?
Norton released results of their Online Shopping Survey just in time for the holidays, when online retailers offer sales to lure shoppers into buying presents for themselves and others.
Published: August 08, 2018 ·2 min read
Secure browsing with a VPN for desktop computers
Protect your browsing data, personal information and privacy with a virtual private network (VPN) for your desktop computer. Learn how a VPN encrypts your browsing data and keeps your computer’s IP address private.
Published: August 08, 2018 ·4 min read

Want more?

Follow us for all the latest news, tips and updates.