Security

Security

Malware

What should you do if a scammer has your email address? Find out if you’ve been hacked and how to safely protect your account.
Pegasus is smartphone spyware that surveils the mobile activity of criminals, but it's also been used against dissidents, journalists, and others.
Published ·
Spam, spam, go away
Declutter your digital life. Learn how to stop spam from clogging your Gmail, Outlook, or other email client.
Published August 08, 2018 · 4 min read
Follow these tips to prevent phishing, learn what to do if you come across it, and stay safer online.
Published ·

Try Norton 360 FREE 30-Day Trial*
 

30 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Account Security

You can permanently delete your Instagram account from the Meta Account Centre. Learn the detailed steps here.
Published ·
Learn tips to create good, strong, and secure passwords that will keep your accounts safer.
Published ·
Learn what two-factor authentication is and how it can drastically improve the security of your accounts.
Published ·
Learn about the potential safety risks of Telegram and how you can protect yourself when using it.
Published ·

Artificial Intelligence

Uncover the secrets of deepfakes. Learn what deepfakes are and how to spot them in today's digitally manipulated AI world!
Published ·
The best way to fight cybercriminals is through education, and that can start at any age. Here are a few tips to help your middle school child explore the Internet freely.
Published ·
Do we take the right measures to protect our children against the most common mobile risks? Review these tips to find out how you can help your kids stay safe on their mobile devices.
Published ·
Free eBooks are a great way for you and your family to learn and grow more, but are they safe to download?
Published ·
Will blaring music really damage your ears?
The sheer volume of digital devices in our lives means that we probably use headphones more than any previous generation but are we doing our hearing lasting damage?
Published July 05, 2022 · 2 min read
Learn what to do if your phone is hacked. This guide helps you unhack your phone and secure for future.
Published ·
Learn how to protect yourself from webcam hacking attacks and keep your private life more secure.
Published ·
What should you do if a scammer has your email address? Find out if you’ve been hacked and how to safely protect your account.
Published ·
Learn whether your phone is hacked and what to do if it is. Here are the main signs to watch out for.
Published ·
How can ad blockers help with irrelevant ads? Enjoy ad-free browsing & protect your personal information from trackers. Read here!
Published ·
Find out what a Trojan virus is, how to detect it and how to remove it. You'll also learn how to effectively protect your device from future attacks.
Published ·
Learn how to clean your Android from viruses and malware and how to protect from future infections.
Published ·
Have you heard of adware and how does it work?
Published ·

Try our malware removal tools for free

  • Virus scanner and removal tool

    Use our virus cleaner Norton AntiVirus Plus to help scan and protect your device in just four simple steps.

  • Spyware detection and removal tool

    Use Norton 360 Standard to help find and remove spyware and other malicious software from your device.

  • Malware scanner and removal tool

    More than just a malware removal tool, Norton 360 Standard packs a suite of online security features.

These are the most common phishing email examples with tips on how to identify and avoid them.
Published ·
Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
Published ·
Are you active on social media? You could be a target for social media phishing attacks designed to steal your private information.
Published ·
Clone phishing is a technique that scammers use to steal your information. Our guide describes how it works, gives examples, and teaches you how to prevent it.
Published ·
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Published ·
Constant connectivity to the Internet has improved our lives by leaps and bounds. From booking dinner reservations and buying movie tickets to keeping in touch with long-distance friends and finding the perfect gifts, the web offers a wealth of information.
Published ·
There are scammers pretending to sell and buy across digital marketplaces. Learn how to spot common Facebook Marketplace scams so you can avoid them.
Published ·
Spam is an unsolicited, unwanted, annoying, and sometimes scammy message. Learn how to stop and prevent it here.
Published ·
Cyber hygiene involves using products and tools that fit your needs, performing hygienic tasks correctly, and starting a routine.
Published ·
Learn how to choose antivirus software to protect your computer or mobile device against viruses, malware, phishing, ransomware and other threats.
Published ·
Learn about cybercrime: the top 5 types and simple steps to protect yourself online. Stay informed and safe!
Published ·
Software and operating system updates help keep your devices running smoothly while protecting you.
Published ·

Want more?

Follow us for all the latest news, tips, and updates.