Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...

3 min read

Most popular in Device Security

Published August 08, 2018 ·3 min read
Published August 08, 2018 ·4 min read
Published August 08, 2018 ·4 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

What is juice jacking? Think twice before using public USB ports
Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.
Published August 07, 2018 ·4 min read
VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published August 08, 2018 ·3 min read
Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published August 08, 2018 ·2 min read

Internet of Things

Connected toys and what you need to know about them
The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.
Published August 08, 2018 ·2 min read
Mobile fitness trackers may be one step away from hacks
Wearable health tracking devices and apps unfortunately feature multiple vulnerabilities hackers can exploit to gain access to your personal information.
Published August 08, 2018 ·4 min read
How to protect your connected wearables
The popularity of smartwatches and jewelry is gaining momentum as more people discover the convenience of having the power of the internet literally in the palms of their hand, in addition to the Internet of Things (IoT) concept in the marketplace.
Published August 08, 2018 ·4 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published August 08, 2018 ·3 min read

Malware

What Is A Computer Virus?
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Published August 07, 2018 ·2 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published August 08, 2018 ·3 min read
What is cryptojacking? How it works and how to help prevent it
Cryptojacking is the unauthorized use of your computer and devices by cybercriminals in order to mine for cryptocurrency.
Published August 08, 2018 ·3 min read
What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published August 08, 2018 ·4 min read

Privacy

Are free VPNs safe? 7 things to know before using free VPNs
You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.
Published August 08, 2018 ·2 min read
Data breaches aren’t going anywhere--what you need to know
It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.
Published August 08, 2018 ·3 min read
How to clean up your online digital footprint
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.
Published August 08, 2018 ·4 min read
Software terms of service and privacy policies explained
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.
Published August 08, 2018 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.