us.norton.com Open in urlscan Pro
2a02:26f0:6c00:2b9::1015  Public Scan

Submitted URL: https://secure.norton.com/pub/cc?_ri_=X0Gzc2X=AQpglLjHJlTQGrNTJYo4l6KzevNUqP9dzajzdzfA5eSEUyDvorLJzbPRsmze7lNXhdS7Cp2RVXtp...
Effective URL: https://us.norton.com/internetsecurity-crm-devicesecurity-5-mobile-security-threats-you-can-protect-yourself-from.html...
Submission: On December 27 via api from BE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

SkipToMainContent
Main menu
Norton homepage
1 Shopping Cart My Account
Close


MY ACCOUNT

 * Sign In
 * Account
 * Preference
 * Billing Info
 * Renew
 * Order History
 * Enter your Product Key

Close
Search
Reset
 * Products & Services
 * Blog
 * Support
 * Free Trials

 * Products & Services
    * All Products & Services
    * All-in-One Plans
      * Norton 360 Deluxe
      * Norton 360 with Lifelock Select
      * Norton 360 with Lifelock Ultimate Plus
    * Antivirus
      * Norton AntiVirus Plus
      * Norton Mobile Security for Android
      * Norton Mobile Security for iOS
      * Norton 360 for Gamers
    * Privacy
      * Norton Secure VPN
      * Norton AntiTrack
      * Privacy Monitor Assistant
    * LifeLock Identity Protection
    * More Norton

 * Blog
 * Support
    * Customer Support
    * Community
    * Spyware & Virus Removal
    * Premium Services
    * How to Renew

 * Free Trial

 * 1 Cart
 * Search
   Close Search box
   Search
 * My Account
   
   Go to Account to download services
   
   Go to Account
    * Account info
    * Preferences
    * Billing info
    * Renew
    * Order History
    * Enter your Product Key

Products & Services Close
 * All Products & Services
 * All-in-One Plans
   * Norton 360 Deluxe
   * Norton 360 with LifeLock Select
   * Norton 360 with Lifelock Ultimate Plus
 * Antivirus
   * Norton AntiVirus Plus
   * Norton Mobile Security for Android
   * Norton Mobile Security for iOS
   * Norton 360 for Gamers
 * Privacy
   * Norton Secure VPN
   * Norton AntiTrack
   * Privacy Monitor Assistant
 * LifeLock Identity Protection
 * More Norton

Support Close
 * Customer Support
 * Community
 * Spyware & Virus Removal
 * Premium Services
 * How to Renew




DEVICE SECURITY


5 MOBILE SECURITY THREATS YOU CAN PROTECT YOURSELF FROM

 * facebookShareLinkText
 * twitterShareLinkText
 * linkedInShareLinkText

By a NortonLifeLock employee

Jan. 7, 2021

Did you know that every year, the number of threats your phone encounters keeps
increasing? In fact, the number of ransomware infections on mobile devices were
up by a third when compared to 2017. The U.S. was the worst affected by mobile
ransomware, accounting for 63 percent of infections.1

The bad news doesn’t stop there.

Once your phone is hacked, your other devices may be next if they are connected.
That’s because your overall online security may only be as strong as the weakest
link in your chain of connected devices. Malware can spread from your hacked
phone to your tablet or another mobile device through the network.2

This article identifies five mobile security threats and how you can help
protect yourself from them.


1. MADWARE AND SPYWARE

Madware is short for mobile adware. It’s a script or program installed on your
phone, often without your consent. Its job? To collect your data for the purpose
of better targeting you with ads. On top of that, madware often comes attached
at the hip with spyware. Spyware collects data about you based on your internet
usage and transmits it to a third party. That data is then bought and used by
companies to send you advertisements. However, seeing more ads is the least of
your worries when it comes to spyware. It also collects information about your
location, internet usage, and even your contacts. This makes it a problem not
just for you, but perhaps also for everyone you know.


2. VIRUSES AND TROJANS

Viruses and Trojans can also attack your mobile devices. They typically come
attached to what appear to be legitimate programs. They can then hijack your
mobile device and mine the information it holds or has access to, such as your
banking information. Viruses and Trojans have also been known to send premium
text messages that can be costly.


3. DRIVE-BY DOWNLOADS

Drive-by downloads refer to any malware installed on your device without
consent. If you visit the wrong website or open the wrong email, you might be
exposed to a drive-by download that automatically installs a malicious file on
your mobile device. The file could be anything from adware, malware or spyware
to something far more nefarious, like a bot, which can use your phone to perform
malicious tasks.


4. BROWSER EXPLOITS

Browser exploits take advantage of known security flaws in your mobile browser.
Browser exploits also work against other applications that function with your
browser, such as PDF readers. If you see that your mobile browser’s homepage or
search page has unexpectedly changed, it could be a sign that you’re a victim of
a browser exploit.


5. PHISHING AND GRAYWARE APPS

Phishing apps are a new take on an old theme. What we are used to is criminals
sending emails that appear to come from a trusted source. They ask for personal
information, such as your password, hoping you’d be trusting enough to respond.
Cyber crimminals have now designed phishing apps to look like real apps, and a
mobile device’s smaller screen can make it even more difficult to tell the
difference. These fake apps secretly collect the information you input —
passwords, account numbers, and more.

Grayware apps aren’t completely malicious, but they can be troublesome because
they can expose users to privacy risks. In fact, Symantec found that 63 percent
of grayware apps leak the affected device’s phone number and 37 percent provide
device location.1


HELPING TO KEEP YOU MORE SECURE AND PRIVATE ON THE DIGITAL SUPERHIGHWAY.


Get Secure VPN for online privacy and provide additional information so we can
better help monitor the Dark Web and notify you if we find your information for
sale there. Both features are included in your Norton 360 subscription.*


Turn On Secure VPN
Turn On Secure VPN
Turn On Secure VPN
Turn On Secure VPN

Add My Info
Add My Info
Add My Info
Add My Info




HOW TO PROTECT YOURSELF FROM MOBILE SECURITY THREATS

Mobile security threats may sound scary, but here are four steps you can take to
help protect yourself from them.

 1. Ensure that your mobile devices are protected by installing Norton
    protection on them. Just like computers, your mobile devices also need
    internet security.
 2. Keep your Norton 360 mobile app updated. Your Norton software on your PC and
    Mac will automatically update, however you will need to update your Norton
    360 mobile app with each new app release, unless your device is set up for
    automatic updates. Everything from your operating system to your social
    network apps are potential gateways for hackers to compromise your mobile
    device. Keeping software up to date ensures the best protection against most
    mobile security threats.
 3. Always use a passcode on your phone. Remember that loss or physical theft of
    your mobile device can also compromise your information.
 4. Download apps from official app stores. Both the Google Play and Apple App
    stores vet the apps they sell; third-party app stores don’t always.
    Downloading from well-known app stores may not ensure you never get a bad
    app, but it can help reduce your risk.

By taking just a few common-sense precautions, you can help protect yourself
from madware and other mobile security threats.


PROTECT YOUR MOBILE DEVICES.
IT'S INCLUDED IN YOUR PLAN.

Download Now
Download Now
Download Now
Download Now



No one can prevent all cybercrime.

* Not all features are available on all platforms. Review system requirements
and complete Terms and Conditions online.
** Please note you will need an existing Norton subscription and one available
seat to activate this protection.
1 Symantec, “2019 Internet Security Threat Report,” February 2019, page 41.
2 https://smallbusiness.chron.com/can-viruses-spread-over-wifi-75136.html



Editorial note: Our articles provide educational information for you.
NortonLifeLock offerings may not cover or protect against every type of crime,
fraud, or threat we write about. Our goal is to increase awareness about cyber
safety. Please review complete Terms during enrollment or setup. Remember that
no one can prevent all identity theft or cybercrime, and that LifeLock does not
monitor all transactions at all businesses.


Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the
NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo
are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates
in the United States and other countries. Firefox is a trademark of Mozilla
Foundation. Android, Google Chrome, Google Play and the Google Play logo are
trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are
trademarks of Apple Inc., registered in the U.S. and other countries. App Store
is a service mark of Apple Inc. Alexa and all related logos are trademarks of
Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks
of Microsoft Corporation in the U.S. and other countries. The Android robot is
reproduced or modified from work created and shared by Google and used according
to terms described in the Creative Commons 3.0 Attribution License. Other names
may be trademarks of their respective owners.










WANT MORE?

Follow us for all the latest news, tips and updates.


 * 
 * 
 * 
 * 


© 2021 NortonLifeLock Inc. All rights reserved.


Privacy Settings
In order to provide with the best experience possible we might sometimes track
information about you. Sometimes this may involve writing a cookie. We use this
information for things like experience enrichment, analytics and targeting
advertising. We recommend allowing these functions to get the most out of your
experience.

--------------------------------------------------------------------------------

PERFORMANCE AND FUNCTIONALITY

These technologies are used to enhance the performance and functionality of our
websites but are non-essential to their use. However, without these cookies,
certain functionality may become unavailable.
> See list of performance and functionality cookies
Cloudfare

Cloudfront

Google Fonts

eGain Chat

Cloudfare

Amazon AWS

Akamai

Adobe Audience Manager

Quantummetric

Medallia

Adobe Target


--------------------------------------------------------------------------------

SOCIAL MEDIA

These technologies are used to enable you to share pages and content that you
find interesting on our websites through third party social networking and other
websites.
> See list of social media cookies
Facebook Connect

Facebook

Youtube

Pinterest

LinkedIn Widget


--------------------------------------------------------------------------------

ANALYTICS

These technologies collect information that is used in aggregate form to help us
understand how our websites are being used are being used or to help us
continuously improve our websites.
> See list of analytics cookies
eXelate

Google Tag Manager

Google Analytic

Twitter Analytic

mPulse

iSpot TV

Adobe Audience Manager

IO

Natural Intelligence

Natural Intelligence

Impact Radius

Tag4arm

Bounce Exchange, Inc

Commission Junctions

OneSpot

Tapad


--------------------------------------------------------------------------------

ADVERTISING

These technologies are used to make advertising messages more relevant to you.
They perform functions like preventing the same ad from continuously
reappearing, ensuring that ads are properly displayed for advertisers, and in
some cases selecting advertisements that are based on your interests.
> See list of advertising cookies
GWM

Google Doubleclick

MediaMath, Inc.

ArtSai

Sizmek

Yahoo Ads

Rimm-Kaufman

Adobe Adlens

eXelate

Outbrain

Facebook

Google Ads

Bing Ads

Twitter Ads

Amazon Ads

Bounce Ex Events

Twitter Conversion

Bounce Exchange, Inc

Reddit

Twitter Ads

Twitter Conversion Tracking

Yahoo Advertising Solutions

Sourcepoint

Proofpoint

Amobee, Inc.

Sourcepoint

Bounce Exchange, Inc

Carbon

RKXD

Chartable

Google Optimize

LinkedIn Widget

Havas

AddShopper

LeadsRx, Inc.

Podsight

Sequel Response

Simplifi Holdings Inc

Reddit

TikTok

Zeta Global

PayPal


--------------------------------------------------------------------------------

Cancel
Save


WE'VE UPDATED OUR PRIVACY AND COOKIES POLICY

We and our partners use cookies on this site to improve the efficiency of the
navigation, perform analytics, serve more relevant advertising content to you
and measure advertising performance, provide social media features, remember
website preferences, and generally improve the user experience. By clicking on
“Yes I agree”, you consent to these cookies. For more information on cookies,
including how to manage your consent, please click on “Settings” to access our
Cookie tool.

✓Yes, I agree No, take me to settings


Feedback