Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...

3 min read

Most popular in Device Security

August 08, 2018·4 min read
August 08, 2018·4 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Start Free Trial

Mobile

Why public Wi-Fi could be a disaster for you

Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.

August 08, 2018·3 min read
What to do when a device is lost or stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...

August 08, 2018·4 min read
What is mobile ransomware?

Mobile ransomware is a form of malware that steals sensitive data or locks a device permanently and then demands payment before unlocking it or returning the data to the user. Folks are tricked into accidentally downloading it through social networking schemes, assuming that they are downloading innocent content or critical services.

August 08, 2018·4 min read
What is juice jacking? Think twice before using public USB ports

Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.

August 08, 2018·4 min read

Internet of Things

What is the Internet of Things?

The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?

August 08, 2018·3 min read
What is a honeypot? How it is used in cyber security?

A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. Learn more about what a honeypot is and how it works.

August 01, 2022·3 min read
The smarter home: How to create a smart home

One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.

August 08, 2018·2 min read
The connected home: How safe is it?

The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!

August 08, 2018·4 min read

Malware

What is cryptojacking? How it works and how to help prevent it

Cryptojacking is the unauthorized use of a computer, tablet, mobile phone, or connected home device by cybercriminals to mine for cryptocurrency. Users can “mine” it on their computer by using special programs to solve complex, encrypted math equations in order to gain a piece of the currency.

August 08, 2018·3 min read
What is a Trojan?

Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

August 08, 2018·4 min read
What Is A Computer Virus?

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…

August 08, 2018·2 min read
What is a botnet?

The Internet is filled with threats to online security. Many of these threats are just productive, positive technologies turned to evil use. The botnet is an example of using good technologies for bad intentions.

August 08, 2018·4 min read

Privacy

Are free VPNs safe? 7 things to know before using free VPNs

You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.

August 08, 2018·2 min read
Data breaches aren’t going anywhere--what you need to know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.

August 08, 2018·3 min read
How a VPN can help hide your search history

Even in private browsing mode, your IP information is being collected. Learn how a VPN can help hide your IP address and search history.

August 08, 2018·2 min read
How to clean up your online digital footprint

Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.

August 08, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.