Online Privacy

Online Privacy

Privacy

What are cookies?

Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects.

4 min read

Most popular in Online Privacy

August 08, 2018·4 min read

Try Norton 360 FREE 14-Day Trial*
 

14 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Start Free Trial

Privacy

10 benefits of a VPN you might not know about

Here are some of the benefits you may be missing out on even if you’ve already got a VPN service.

August 08, 2018·3 min read
25 Mac security tips and settings

Your new Mac computer or iOS update means it’s a good time to think about security and privacy. Here’s how.

August 08, 2018·4 min read
5 tips for social media security and privacy

Social media accounts are powerful tools in the wrong hands. Weve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam...

August 08, 2018·3 min read
Are free VPNs safe? 7 things to know before using free VPNs

You might be tempted to sign up for a free VPN service. But are free VPNs safe to use? Learn more.

August 08, 2018·2 min read

ID Theft

Session hijacking: What is a session hijacking and how does it work?

A session hijacking attack happens when an attacker takes over your internet session. A session hijacking attacker can then do anything you could do on the site. Here’s how to help protect against session hijacking.

August 08, 2018·3 min read

WiFi

The dos and don'ts of using public Wi-Fi

Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. Wi-Fi has made our lives a little easier, but it also poses security risks.

August 08, 2018·4 min read
What is a man-in-the-middle attack?

A man-in-the-middle attack is like eavesdropping. When data is sent between a computer and a server, a cybercriminal can get in between and spy. A man-in-the-middle attack requires three players: the victim, the entity with which the victim is trying to communicate, and the “man in the middle” who’s intercepting the victim’s communications.

August 08, 2018·2 min read

Kid's Safety

10 Internet safety rules to help keep your family safe online

Children today can access more information than any generation before. Because of the Internet they now have a wealth of information that can enrich their lives in new and wondrous ways. But the...

August 08, 2018·3 min read
50-plus Twitch extensions every video gamer should know

An overview of Twitch extensions and some essential ones every gamer should know.

January 11, 2021·3 min read
5 ways to help protect your kids online, as more people are on lockdown

With more kids locked down at home, parents can help guide their children’s online exposure and behavior. Here’s how.

December 01, 2021·3 min read
Cyber safety guide for college kids

College is a whole new world. Between living on your own, meeting new people, and picking out classes you care about, there are some important things to consider while embracing your independence.

August 08, 2018·4 min read

Want more?

Follow us for all the latest news, tips and updates.