Norton Blog

Malware

Editors' picks

How is AI affecting online dating? How to stay safe
With 59% of people considering using AI as their online dating coach, looking for love is more complicated than ever before.
Published: April 23, 2024 ·6 min read
Are younger generations more susceptible to online scams?
Growing up in a tech-centric world has its drawbacks, and Gen Z is more exposed to cyber threats than ever before.
Published: April 10, 2024 ·3 min read
Published: May 03, 2024 ·8 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Most popular

What is the dark web and how do you access it?
The dark web sounds ominous, but many people use it for enhanced privacy and security. Learn how to access it plus tips to stay safe while browsing.
Published: July 19, 2023 ·3 min read
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
How to find hidden cameras: 10 detection methods
Be it a hotel or vacation rental, you may wonder about hidden cameras. Follow this guide to learn how to find hidden cameras and help protect your privacy.
Published: December 21, 2022 ·2 min read
14 cryptocurrency scams to avoid in 2024
Discover the latest tactics used in cryptocurrency scams. Arm yourself with the knowledge you need to protect your investments and your cryptocurrency assets.
Published: January 04, 2024 ·14 min read
Trojan viruses: Detecting and removing
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: May 08, 2024 ·6 min read
Hard drive failure: Causes + how to check
If your device isn't working properly, it may be a result of hard drive failure. Learn why hard drives fail, the causes, and how to spot it.
Published: April 02, 2024 ·11 min read
How to wipe a hard drive on Windows + Mac devices
Ready to wipe your hard drive? Learn how to wipe a hard drive on Windows or Mac to give your computer a fresh start.
Updated: April 02, 2024 ·13 min read

Most popular in Device Security

VPN protocols: 7 types and comparisons
VPN protocols govern how data is transmitted between a device and a VPN server. Learn about the types and how they work.
Published: May 13, 2024 ·8 min read
What is incognito mode and how do you use it?
Use incognito mode to make your browsing experience more private and help stop your device from storing data.
Updated: April 16, 2024 ·8 min read
13 benefits of a VPN you might not know about
There are many benefits of using a VPN, including hiding your private browsing history, avoiding data throttling, and dodging censorship.
Updated: February 26, 2024 ·9 min read

Most popular in Device Security

What is a third-party app? Examples and potential risks
Third-party apps are apps that you can download onto your smart devices from an app store that wasn’t developed or supported by the operating system maker.
Published: November 13, 2023 ·6 min
What is a honeypot and how does it work?
Honeypots are cyber traps used to lure and track hackers. Learn more about how honeypots work in cybersecurity and the different types.
Published: October 06, 2023 ·7 min
How do I get rid of pop-up ads on my phone?
Pop-up ads and alerts are disruptive, and they can be a security risk too. Learn how to get rid of pop-ups on Android and iPhone.
Published: July 20, 2023 ·3 min

Want more?

Follow us for all the latest news, tips and updates.