Cyberthreat

Device Security

Mobile

The 5 stages of phone loss grief

Its happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many likes that picture of your...

3 min read

Most popular in Device Security

August 08, 2018·4 min read
August 08, 2018·4 min read

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

What is juice jacking? Think twice before using public USB ports

Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.

August 07, 2018·4 min read
VPN for Android

Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.

August 08, 2018·3 min read
Norton App Lock: Protect your sensitive apps

There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...

August 08, 2018·4 min read
Mobile scams: How to identify them and protect yourself

Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.

August 08, 2018·2 min read

Internet of Things

Connected toys and what you need to know about them

The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.

August 08, 2018·2 min read
Mobile fitness trackers may be one step away from hacks

Wearable health tracking devices and apps unfortunately feature multiple vulnerabilities hackers can exploit to gain access to your personal information.

August 08, 2018·4 min read
What is the Internet of Things?

The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?

August 08, 2018·3 min read
The connected home: How safe is it?

The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!

August 08, 2018·4 min read

Malware

What are malicious websites?

Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.

August 07, 2018·3 min read
What Is A Computer Virus?

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…

August 07, 2018·2 min read
What is cryptojacking? How it works and how to help prevent it

Cryptojacking is the unauthorized use of a computer, tablet, mobile phone, or connected home device by cybercriminals to mine for cryptocurrency. Users can “mine” it on their computer by using special programs to solve complex, encrypted math equations in order to gain a piece of the currency.

August 08, 2018·3 min read
What is a Trojan?

Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

August 08, 2018·4 min read

Privacy

VPN for Mac

Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.

August 07, 2018·4 min read
Software terms of service and privacy policies explained

If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.

August 08, 2018·3 min read
Straight talk about cyberstalking

Technology opens our lives up in ways that weren't possible even less than a decade ago.

August 08, 2018·2 min read
What are cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.

August 08, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.