Norton Blog

Privacy

Editors picks

Ransomware: 5 dos and don'ts

Guest Post By Kevin Haley, director, NortonLifeLock Security Response I despise all forms of bullying.Perhaps the one I hate most of all is where the bully takes a personal item, snatching it from you,...

August 08, 2018·3 min read
Data breaches aren’t going anywhere--what you need to know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising.

August 08, 2018·3 min read
10 Internet safety rules to help keep your family safe online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...

August 08, 2018·3 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Start Free Trial

Most popular

Connected toys and what you need to know about them

The Internet of Things (IoT) isn’t just some lofty concept about future integration of technology into the home. It is already here, and we’re already living it.

August 08, 2018·2 min read
What to do when a device is lost or stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...

August 08, 2018·4 min read
What to do if you become involved in a data breach

Cybercriminals are attracted to stealing data that they can make money from, such as credit and debit card numbers, bank account numbers, Social Security numbers, birthdates, full names and addresses. They can commit identity theft with Social Security numbers, sell credit and debit card numbers to other cybercriminals or bleed bank accounts dry using bank account information.

August 08, 2018·4 min read
What is a VPN? And why you should use a VPN on public Wi-Fi

Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk. 

August 08, 2018·3 min read

Most popular in Device Security

Most popular in Device Security

Want more?

Follow us for all the latest news, tips and updates.