Cyberthreat

Device Security

Mobile

Most popular in Device Security

Published August 08, 2018 · 3 min read
Published August 08, 2018 · 4 min read
Published August 08, 2018 · 4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

VPN for Android
Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.
Published August 08, 2018 · 3 min read
Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published August 08, 2018 · 4 min read
Mobile scams: How to identify them and protect yourself
Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potential catastrophe. In this post we’ll outline how you can keep your personal data protected from prying eyes.
Published August 08, 2018 · 2 min read
Why public Wi-Fi could be a disaster for you
Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.
Published August 08, 2018 · 3 min read

Internet of Things

What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published August 08, 2018 · 3 min read
Connected toys and what you need to know about them
The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.
Published August 08, 2018 · 2 min read
Securing the Internet of Things
Wearable devices, the connected home, and the connected car are all relatively recent technologies, yet have quickly become the new rage in tech. Everything from the devices in your pocket to the appliances in your home and the car you drive can transmit information about your life habits because they all have one thing in common...
Published August 08, 2018 · 4 min read
How to protect your connected wearables
The popularity of smartwatches and jewelry is gaining momentum as more people discover the convenience of having the power of the internet literally in the palms of their hand, in addition to the Internet of Things (IoT) concept in the marketplace.
Published August 08, 2018 · 4 min read
Webcam hacking
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Published August 08, 2018 · 4 min read
What are malicious websites?
Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.
Published August 08, 2018 · 3 min read
Virus FAQ
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published August 08, 2018 · 3 min read
OS X malware
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
Published August 08, 2018 · 2 min read
VPN for Mac
Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.
Published August 07, 2018 · 4 min read
Software terms of service and privacy policies explained
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information.
Published August 08, 2018 · 3 min read
Straight talk about cyberstalking
Technology opens our lives up in ways that weren't possible even less than a decade ago.
Published August 08, 2018 · 2 min read
What is a no-log VPN?
VPNs with no logs protect your privacy by not keeping logs of where you go or what you do online.
Published August 08, 2018 · 2 min read

Want more?

Follow us for all the latest news, tips and updates.