Online Privacy

Online Privacy

Privacy

What are cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.

4 min read

Most popular in Online Privacy

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·3 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Privacy

VPN for Mac
Help protect your browsing activity while using your Mac computer with a VPN. Learn how a VPN provides privacy while you browse and helps keep your information safe when using public Wi-Fi.
Published: August 07, 2018 ·4 min read
Internet privacy: A guide to online privacy
Take steps to boost your privacy online. Here’s what to do and why it’s important.
Published: August 08, 2018 ·3 min read
Internet tracking: How and why we’re followed online
Internet tracking is how websites study our behaviour when we visit them.
Published: June 09, 2022 ·3 min
What is an IP address? A definition + how to find it
Explore the ins and outs of blockchain security with this comprehensive guide covering different types of blockchain and best practices to follow.
Published: July 25, 2022 ·4 min read

ID Theft

Session hijacking: What is a session hijacking and how does it work?
A session hijacking attack happens when an attacker takes over your internet session. A session hijacking attacker can then do anything you could do on the site. Here’s how to help protect against session hijacking.
Published: August 08, 2018 ·3 min read

WiFi

The dos and don'ts of using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks.
Published: August 08, 2018 ·4 min read
What is a man-in-the-middle attack?
A man-in-the-middle attack is like eavesdropping. When data is sent between a computer and a server, a cybercriminal can get in between and spy. A man-in-the-middle attack requires three players: the victim, the entity with which the victim is trying to communicate, and the “man in the middle” who’s intercepting the victim’s communications.
Published: August 08, 2018 ·2 min read

Kid's Safety

Cyber safety guide for college kids
College is a whole new world. Between the excitement of living on your own, meeting new, interesting people, and picking out classes you actually care about, there are some equally important things to consider while embracing your full-fledged independence.
Published: August 08, 2018 ·4 min read
Cyber safety guide for middle school kids
The best way to fight cybercriminals is through education, and that can start at any age. Here are a few tips to help your middle school child explore the Internet freely.
Published: August 08, 2018 ·3 min read
10 Internet safety rules to help keep your family safe online
Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...
Published: August 08, 2018 ·3 min read
50-plus Twitch extensions every video gamer should know
An overview of Twitch extensions and some essential ones every gamer should know.
Published: January 11, 2021 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.