Norton Blog

Privacy

Editors’ picks

What is a data leak and how can you protect yourself?
A data leak happens when you accidentally expose personal information—read on and learn how to avoid this.
Published: July 25, 2024 · 6 min read
AI for good — Using AI to help protect against scams
In our digital lives, cyber threats evolve faster than ever. Norton is taking a groundbreaking leap with Genie, our latest innovation in scam detection and cybersecurity.
Updated: February 19, 2025 · 7 min read
USPS scam texts: what you need to know
Is that USPS delivery notice real? Learn to spot fake USPS texts, avoid scams, and protect your personal info.
Published: April 08, 2024 · 4 min read

Use a VPN to access your favorite content and browse privately on all your devices

Get a Norton 360 FREE Trial*

Try comprehensive antivirus, device security, VPN access, and online privacy protection for FREE.*

Join today. Cancel anytime.
 

*Terms Apply

Most popular

How to tell if your phone is tracked, tapped, or monitored by spy software
Unsure how to tell if your phone is tapped? Learn how to check if your phone is tapped, tracked, or monitored.
Published: December 06, 2023 · 11 min
How to know if someone is watching you through your phone camera
Modern technology makes phone camera hacking less common, but it’s still possible. Learn the warning signs and tips for protecting your phone.
Published: October 25, 2023 · 9 minutes
How to change your Wi-Fi router password: 4 easy steps
Learn how to change your Wi-Fi router password in four easy steps. Enhance your network security and protect your communications and data from unauthorized access.
Published: November 01, 2023 · 6 min read
Is my phone listening to me? Yes, here’s why and how to stop it
Is my phone listening to me? Yes. Read more about why your phone listens to you and what you can do to stop it.
Updated: September 09, 2024 · 6 min read
What is a Trojan? Is it a virus or is it malware?
Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
Published: July 23, 2020 · 4 min read
Hard drive failure: Causes + how to check
If your device isn't working properly, it may be a result of hard drive failure. Learn why hard drives fail, the causes, and how to spot it.
Published: April 03, 2024 · 11 min read
How to wipe a hard drive on Windows + Mac devices
Ready to wipe your hard drive? Learn how to wipe a hard drive on Windows or Mac to give your computer a fresh start.
Updated: April 02, 2024 · 13 min read

Most popular in Device Security

Waiting at the gate can get pretty boring—but think twice before connecting to airport wifi without taking the proper precautions.
Published: ·
Streaming is a method of accessing content via the internet. Read on to learn how streaming works.
Published: ·
Camping is fun, but so is being connected. Check out these tips to help keep your connection secure.
Published: ·

Most popular in Device Security

Ready to embark on your next hiking adventure? A GPS tracker may help you stay safe and connected while exploring nature.
Published: ·
Understand the different types of firmware, how it helps devices function, and how to keep your firmware updated to maximize performance and security.
Published: ·
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: ·

Want more?

Follow us for all the latest news, tips and updates.