Security

Security

Privacy

Most popular in Security

What is Pegasus spyware + how to remove it from your mobile device?
Pegasus spyware is one of the most sophisticated digital surveillance tools out there. Learn what it is and how it works.
Published: October 06, 2023 · 4 min
Is Poshmark safe? 6 common Poshmark scams to look out for
Learn about six common Poshmark scams to avoid and get tips for secure buying and selling on the online marketplace.
Published: January 17, 2025 · 9 min read
Phishing protection: 11 tips to protect yourself from phishing
These phishing protection tips will help you stay safer online, teach you the signs of phishing, and what to do if you see it.
Updated: March 14, 2025 · 12 min read

Norton 360 FREE Trials*
 

Try comprehensive antivirus, device security, and online privacy protection for FREE*.
 

Join today. Cancel anytime.
 

*Terms Apply

Account Security

You can permanently delete your Instagram account from the Meta Account Center. Learn the detailed steps here.
Published: ·
Need to delete your X (formerly Twitter) account? Our guide offers step-by-step instructions for both mobile and desktop users.
Published: ·
Is WhatsApp safe? Learn how to use WhatsApp safely with our security and privacy tips.
Published: ·
Apple Pay is generally considered safe, but it’s not foolproof. Get tips to better protect your payments.
Published: ·

Artificial Intelligence

Chatbots learn from the info you enter. Discover what not to share with AI chatbots to keep data safe.
Published: ·
Learn about AI scams to watch out for: find out how they operate so you can be aware of potential risks.
Published: ·
Learn how criminals use dark AI to enhance cyberattacks and how to start protecting yourself against them.
Published: ·
While AI is often helpful, it can also cause harm. Learn about the risks and dangers of AI, and what you can do to protect against them.
Published: ·
Kids are using tablets in schools now more than ever. Our guide details the pros, cons, and safety for tablets in the classroom.
Published: ·
Trendy social media apps are nothing new. Here’s what you can do to keep your children Cyber Safe while using Snapchat.
Published: ·
Are you worried about what’s posted about your kids online? Learn about the dangers of sharenting and how to protect your child’s privacy.
Published: ·
These iPhone parental controls can help you manage your kids' online activities and keep them safer.
Published: ·
Learn why healthcare facilities are prime targets for hackers and how hospital cyberattacks endanger patient care.
Published: ·
Learn what wardriving is, how it works, and strategies to protect your Wi-Fi from wardrivers.
Published: ·
Discover what to dial to see if your phone is hacked and learn the next steps to take if it is.
Published: ·
Learn how iPhones can get hacked, signs to know if your iPhone’s been hacked, and how to fix the issue.
Published: ·
Learn about logic bombs and their dangers. Explore real-world logic-bomb examples, understand how they work, and discover tips to protect yourself.
Published: ·
Ransomware protection involves securing important files and info on your computer. Learn more here.
Published: ·
Is your phone acting suspiciously? Find out how to detect spyware on Android phones the easy way.
Published: ·
Zeus viruses live on your device and steal financial information — learn how to protect yourself.
Published: ·

Try our malware removal tools for free

  • Virus scanner and removal tool

    Use our virus cleaner Norton AntiVirus Plus to help scan and protect your device in just four simple steps.

  • Spyware detection and removal tool

    Use Norton 360 Standard to help find and remove spyware and other malicious software from your device.

  • Malware scanner and removal tool

    More than just a malware removal tool, Norton 360 Standard packs a suite of online security features.

Smishing is a type of phishing carried out via text message. Read this guide to learn how smishing works, warning signs, and how to stay safe.
Published: ·
Clicking a phishing link doesn’t automatically spell disaster. Learn what happens and how to protect yourself from harm.
Published: ·
Spoofing is the act of falsifying information to impersonate a trusted source, often to steal data or money. Learn more about spoofing here.
Published: ·
Learn how Norton protects your sensitive information with advanced tools, smart filters, and real-time threat monitoring.
Published: ·
Payment apps can be very convenient––as long as you don’t send money to a scammer. Recovering your money may be harder than you think.
Published: ·
In the glittering world of fame and fortune, even celebrities are not immune to cyber attacks and the burden they leave behind.
Published: ·
Our Norton experts volunteered themselves as targets to uncover the ins and outs of part-time job scams. This is what we learned.
Published: ·
A scam victim shared her story with us. This is what we can learn from it.
Published: ·
Curious about app permissions to avoid in 2025? Discover best practices for digital safety.
Published: ·
RFID blocking is meant to protect your bank cards from unauthorized scanning, but does it work? Find out here.
Published: ·
Learn how criminals use dark AI to enhance cyberattacks and how to start protecting yourself against them.
Published: ·
Apple Pay is generally considered safe, but it’s not foolproof. Get tips to better protect your payments.
Published: ·

Want more?

Follow us for all the latest news, tips, and updates.