Cyberthreat

Device Security

Mobile

Most popular in Device Security

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Mobile

Norton App Lock: Protect your sensitive apps
There are currently over 4 million apps available across various mobile platforms. It's virtually impossible to keep track of each and every app on all of your devices, whether it is a shared...
Published: August 08, 2018 ·4 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published: August 08, 2018 ·2 min read
Three easy steps to protect your Android
Android phones appear to be the most vulnerable to malware because of the openness of the platform. The flexibility that makes for so many awesome apps has the slight downside of leaving Androids open to some security vulnerabilities.
Published: August 08, 2018 ·2 min read
Telltale signs an app is violating your privacy
Malware isn't just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your...
Published: August 08, 2018 ·3 min read

Internet of Things

Connected toys and what you need to know about them
The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.
Published: August 08, 2018 ·2 min read
What is the Internet of Things?
The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?
Published: August 08, 2018 ·3 min read
The connected home: How safe is it?
The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!
Published: August 08, 2018 ·4 min read
Keep your smartphone safe when using it with a connected device hub
Smartphones have become the new norm. In a world of constant connectivity, smartphones are like little personal assistants, keeping us on top of our work and social schedules, enabling us to chart our health, browse the latest news, and access thousands of powerful apps.
Published: August 08, 2018 ·2 min read

Malware

What Is A Computer Virus?
A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…
Published: August 07, 2018 ·2 min read
Webcam hacking
You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.
Published: August 08, 2018 ·4 min read
Virus FAQ
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: August 08, 2018 ·3 min read
What is a Trojan?
Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.
Published: August 08, 2018 ·4 min read

Privacy

What are some of the laws regarding internet and data security?
Numerous laws in the U.S. cover Internet, data security, and privacy in the United States, with the 1974 Privacy Act (link is external) arguably being the foundation for it all. The Privacy Act passed to establish control over the collection, maintenance, use, and dissemination of personal information by agencies in the executive branch of the U.S. government.
Published: January 18, 2018 ·3 min read
Data breaches aren’t going anywhere--what you need to know
It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.
Published: August 08, 2018 ·3 min read
How to clean up your online digital footprint
Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.