Online Privacy

Online Privacy


What are cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.

4 min read

Most popular in Online Privacy

Published: August 08, 2018 ·3 min read
Published: August 08, 2018 ·4 min read
Published: August 08, 2018 ·3 min read

Try Norton 360 FREE 14-Day Trial*

14 days of FREE* comprehensive antivirus, device security, and online privacy.

Join today. Cancel anytime.

*Terms Apply


How to delete your digital footprint: Complete guide
Learn how to delete your digital footprint and why it’s important for your online privacy. Discover tips to stay private online.
Published: May 21, 2024 ·8 min 45 sec read
Is free public Wi-Fi as safe as you think?
Free Wi-Fi might be appealing but it comes with risks. Learn how to stay safer on public Wi-Fi and keep your data private.
Published: May 03, 2024 ·5 min read
What is a VPN? And why you should use a VPN on public Wi-Fi
Surfing the Web or transacting on an unsecured Wi-Fi network means you’re placing your private information and anonymity at risk.
Published: November 17, 2023 ·3 min
What is private browsing? How to use it on any browser
Major web browsers offer private browsing or incognito modes. But what does “private” really mean? Find out here.
Published: November 17, 2023 ·3 min read

ID Theft

Session hijacking: What is a session hijacking and how does it work?
A session hijacking attack happens when an attacker takes over your internet session. A session hijacking attacker can then do anything you could do on the site. Here’s how to help protect against session hijacking.
Published: August 08, 2018 ·3 min read


The dos and don'ts of using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks.
Published: August 08, 2018 ·4 min read
What is a man-in-the-middle attack?
A man-in-the-middle attack is like eavesdropping. When data is sent between a computer and a server, a cybercriminal can get in between and spy. A man-in-the-middle attack requires three players: the victim, the entity with which the victim is trying to communicate, and the “man in the middle” who’s intercepting the victim’s communications.
Published: August 08, 2018 ·2 min read

Kid's Safety

Will blaring music really damage your ears?
The sheer volume of digital devices in our lives means that we probably use headphones more than any previous generation but are we doing our hearing lasting damage?
Published: July 05, 2022 ·2 min read
Why people are more likely to see online bullying than offline.
Parents want what’s best for their children, and that includes cybersecurity. We have a put together a couple of ideas that can help with that.
Published: April 20, 2022 ·2 min read
5 ways to help protect your kids online, as more people are on lockdown
With more kids locked down at home, parents can help guide their children’s online exposure and behavior. Here’s how.
Published: December 01, 2021 ·3 min read
Steam account hacked? Here’s your step-by-step account recovery guide
A step-by-step guide to recovering a hacked Steam account, plus tips to avoid a stolen Steam account.
Published: February 19, 2021 ·3 min read

Want more?

Follow us for all the latest news, tips and updates.