Cyberthreat

Device Security

Mobile

Most popular in Device Security

August 08, 2018·4 min read
August 08, 2018·4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Start Free Trial

Mobile

Why public Wi-Fi could be a disaster for you

Although WiFi has greatly increased convenience for laptop and smartphone users, it’s also opened up a significant number of security risks. Here’s how you can protect yourself from these threats.

August 08, 2018·3 min read
What to do when a device is lost or stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...

August 08, 2018·4 min read
What is mobile ransomware?

Mobile ransomware is a form of malware that steals sensitive data or locks a device permanently and then demands payment before unlocking it or returning the data to the user. Folks are tricked into accidentally downloading it through social networking schemes, assuming that they are downloading innocent content or critical services.

August 08, 2018·4 min read
VPN for smartphones

How does a VPN for your smartphone protect your privacy? Learn how using a VPN on your smartphone, especially while using public Wi-Fi networks, can help keep your browsing activity safe and private.

August 08, 2018·3 min read

Internet of Things

What is the Internet of Things?

The Internet of Things or IoT: It’s a phrase you may have seen or heard as our world grows more connected by the day. But what does it mean?

August 08, 2018·3 min read
The smarter home: How to create a smart home

One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. Let’s take a look at how-to create a smart home while following cybersecurity best practices.

August 08, 2018·2 min read
The connected home: How safe is it?

The connected home is focused on ease of use and convenience. Have you ever left the house and wondered if you turned the heater off, or locked the front door? Well, with the connected home, there’s an app for that!

August 08, 2018·4 min read
Securing the Internet of Things

Wearable devices, the connected home, and the connected car are all relatively recent technologies, yet have quickly become the new rage in tech. Everything from the devices in your pocket to the appliances in your home and the car you drive can transmit information about your life habits because they all have one thing in common...

August 08, 2018·4 min read

Malware

What is a Trojan?

Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file.

August 08, 2018·4 min read
What Is A Computer Virus?

A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses…

August 08, 2018·2 min read
What are malicious websites?

Most people don't know that you don’t have to intentionally download a malicious attachment to compromise your computer’s security.

August 08, 2018·3 min read
Webcam hacking

You might have heard that hackers can access your webcam. In the age of the Internet of Things, that’s a pretty scary notion.

August 08, 2018·4 min read

Privacy

Data breaches aren’t going anywhere--what you need to know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.

August 08, 2018·3 min read
How a VPN can help hide your search history

Even in private browsing mode, your IP information is being collected. Learn how a VPN can help hide your IP address and search history.

August 08, 2018·2 min read
How to clean up your online digital footprint

Your “digital footprint” includes all traces of your online activity, from commenting on news pieces or social media to making online purchases. When you know the boundaries of your digital footprint, and take steps to control it, you can protect your identity and your reputation.

August 08, 2018·4 min read
Protecting your privacy on social media networks

Social networking sites such as Facebook, Twitter, Instagram, and Snapchat have become societal cornerstones. People love sharing their personal news and views about what’s going on in their lives.

August 08, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.