Norton Blog

Privacy

Editors’ picks

A data leak happens when you accidentally expose personal information—read on and learn how to avoid this.
Published: ·
Is that message a scam? Ask the AI behind Genie
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Published: January 17, 2024 ·6 min read
USPS scam texts: what you need to know
Is that USPS delivery notice real? Learn to spot fake USPS texts, avoid scams, and protect your personal info.
Published: April 08, 2024 ·4 min read

Use a VPN to access your favorite content and browse privately on all your devices

Get a Norton 360 FREE Trial*

Try comprehensive antivirus, device security, VPN access, and online privacy protection for FREE.*

Join today. Cancel anytime.
 

*Terms Apply

Most popular

How to tell if your phone is tracked, tapped, or monitored by spy software
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Published: December 06, 2023 ·11 min
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Published: October 25, 2023 ·9 minutes
How to change your Wi-Fi router password: 4 easy steps
Learn how to change your Wi-Fi router password in four easy steps. Enhance your network security and protect your communications and data from unauthorized access.
Published: November 01, 2023 ·6 min read
Is my phone listening to me? Yes, here’s why and how to stop it
Is my phone listening to me? Yes. Read more about why your phone listens to you and what you can do to stop it.
Published: June 13, 2023 ·2 min read
Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: ·
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: ·
IP spoofing is a technique cybercriminals use to manipulate internet data. Learn more about what it is and how it works.
Published: ·

Most popular in Device Security

Surfing the internet with in-flight wifi? Protect your data with a VPN to ensure secure browsing while traveling.
Published: ·
Waiting at the gate can get pretty boring—but think twice before connecting to airport wifi without taking the proper precautions.
Published: ·
Streaming is a method of accessing content via the internet. Read on to learn how streaming works.
Published: ·

Most popular in Device Security

Ready to embark on your next hiking adventure? A GPS tracker may help you stay safe and connected while exploring nature.
Published: ·
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: ·
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: ·

Want more?

Follow us for all the latest news, tips and updates.