Security

Security

Malware

What should you do if a scammer has your email address? Find out if you have been hacked and how to safely protect your account.
Pegasus is smartphone spyware that surveils the mobile activity of criminals, but it's also been used against dissidents, journalists, and others.
Published: ·
How to get rid of spam emails
Declutter your digital life. Learn how to stop spam from clogging your Gmail, Outlook, or other email client.
Published: August 08, 2018 · 4 min read
Follow these tips to prevent phishing, stay safer online, and learn what to do if you come across it.
Published: ·

Try Norton 360 FREE 7-Day Trial*
 

7 days of FREE* comprehensive antivirus, device security, and online privacy.
 

Join today. Cancel anytime.
 

*Terms Apply

Account Security

Learn tips to create good, strong, and secure passwords that will keep your accounts safer.
Published: ·
Learn what two-factor authentication is and how it can drastically improve the security of your accounts.
Published: ·
How online creeping and cyber stalking differ, the most common cyber stalking tactics, and where we are with stalkerware today
Published: ·
Some 10 million identity thefts happen in the United States every year. Taking extra steps to protect your personal information—and knowing what information you need to safeguard—is the best way to prevent identity theft from happening to you.
Published: ·

Artificial Intelligence

AI for good — Using AI to help protect against scams
Learn how advanced technology can identify and block scams before they reach you.
Published: March 20, 2025 · 7 min read
What is a Deepfake Anyway?
If you’re worried that a photo or video may be a deepfake, there are some simple tell-tale signs.
Published: May 02, 2022 · 2 min read
Children are among the most active Internet users, and are unfortunately subject to a number of threats. If you allow your children to spend considerable time surfing the web, its important to know...
Published: ·
Do we take the right measures to protect our children against the most common mobile risks? Review these tips to find out how you can help your kids stay safe on their mobile devices.
Published: ·
Parents today are challenged with the pros and cons of giving their child digital freedom. Limiting a child’s access to the Internet could impact their ability to learn and develop. However, the Internet could also expose kids to threats and information far beyond their capacity to handle.
Published: ·
Are you worried about what’s posted about your kids online? Learn about the dangers of sharenting and how to protect your child’s privacy.
Published: ·
What should you do if a scammer has your email address? Find out if you have been hacked and how to safely protect your account.
Published: ·
Learn whether your phone is hacked and what to do if it is. Here are the main signs to watch out for.
Published: ·
To remove a hacker from your phone, review app permissions, remove unfamiliar apps, update the OS, clear cache, or do a factory reset.
Published: ·
Your phone may be tapped. Learn how to recognise it and what to do to protect your privacy from unwanted guests.
Published: ·
Learn about how antivirus works, its role in protecting your devices from viruses and malware, and more.
Published: ·
Are you a Norton customer who is facing a problem with malware? Use this page to get answers to frequently asked questions. My computer has a virus. How did this happen? Thousands of new viruses…
Published: ·
Online threats to Macs have increased lately. The most recent one to make news, called “Crisis”, targets Mac users. Your risk of infection is probably very low, but here are some basic facts: “Crisis” is a Trojan that…
Published: ·
Help protect your device against Trojan viruses. Learn effective ways and essential tips to defend against malware and other threats.
Published: ·

Try our malware removal tools for free

  • Virus scanner and removal tool

    Use our virus cleaner Norton AntiVirus Plus to help scan and protect your device in just four simple steps.

  • Spyware detection and removal tool

    Use Norton 360 Standard to help find and remove spyware and other malicious software from your device.

  • Malware scanner and removal tool

    More than just a malware removal tool, Norton 360 Standard packs a suite of online security features.

Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Published: ·
These are the most common phishing email examples with tips on how to identify and avoid them.
Published: ·
Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
Published: ·
Are you active on social media? You could be a target for social media phishing attacks designed to steal your private information.
Published: ·
Nobody likes being manipulated—and that’s exactly what happens to people when they fall victim to social engineering scams online. In addition to using more sophisticated malware, ransomware, and viruses, online criminals have become increasingly aware of the use and power psychology plays in weaving believable online fiction.
Published: ·
Ransomware is a form of malware that allows cybercriminals to hold your PC, or files on it, for ransom. This is typically much worse than your average spyware or spam, as the crooks behind the ransomware can ask for a great deal of money.
Published: ·
Constant connectivity to the Internet has improved our lives by leaps and bounds. From booking dinner reservations and buying movie tickets to keeping in touch with long-distance friends and finding the perfect gifts, the web offers a wealth of information.
Published: ·
Spam is an unsolicited, unwanted, annoying, and sometimes scammy message. Learn how to stop and prevent it here.
Published: ·
Learn how to remove malware and viruses from your device before they can expose sensitive information to hackers.
Published: ·
Cyber security is the state or process of protecting networks, devices, and programs from any type of cyber attack. Cyber security starts with users having good cyber threat defense education.
Published: ·
Learn how to change your Wi-Fi router password to enhance your security and protect your data.
Published: ·
Gen Threat Labs researchers reported that scammers have been exceedingly active, innovating new techniques and exploiting AI capabilities.
Published: ·

Want more?

Follow us for all the latest news, tips, and updates.