us.norton.com
Open in
urlscan Pro
2a02:26f0:6c00:2b9::1015
Public Scan
Submitted URL: https://secure.norton.com/pub/cc?_ri_=X0Gzc2X=AQpglLjHJlTQGrNTJYo4l6KzevNUqP9dzajzdzfA5eSEUyDvorLJzbPRsmze7lNXhdS7Cp2RVXtp...
Effective URL: https://us.norton.com/internetsecurity-crm-devicesecurity-5-mobile-security-threats-you-can-protect-yourself-from.html...
Submission: On December 27 via api from BE — Scanned from DE
Effective URL: https://us.norton.com/internetsecurity-crm-devicesecurity-5-mobile-security-threats-you-can-protect-yourself-from.html...
Submission: On December 27 via api from BE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
SkipToMainContent Main menu Norton homepage 1 Shopping Cart My Account Close MY ACCOUNT * Sign In * Account * Preference * Billing Info * Renew * Order History * Enter your Product Key Close Search Reset * Products & Services * Blog * Support * Free Trials * Products & Services * All Products & Services * All-in-One Plans * Norton 360 Deluxe * Norton 360 with Lifelock Select * Norton 360 with Lifelock Ultimate Plus * Antivirus * Norton AntiVirus Plus * Norton Mobile Security for Android * Norton Mobile Security for iOS * Norton 360 for Gamers * Privacy * Norton Secure VPN * Norton AntiTrack * Privacy Monitor Assistant * LifeLock Identity Protection * More Norton * Blog * Support * Customer Support * Community * Spyware & Virus Removal * Premium Services * How to Renew * Free Trial * 1 Cart * Search Close Search box Search * My Account Go to Account to download services Go to Account * Account info * Preferences * Billing info * Renew * Order History * Enter your Product Key Products & Services Close * All Products & Services * All-in-One Plans * Norton 360 Deluxe * Norton 360 with LifeLock Select * Norton 360 with Lifelock Ultimate Plus * Antivirus * Norton AntiVirus Plus * Norton Mobile Security for Android * Norton Mobile Security for iOS * Norton 360 for Gamers * Privacy * Norton Secure VPN * Norton AntiTrack * Privacy Monitor Assistant * LifeLock Identity Protection * More Norton Support Close * Customer Support * Community * Spyware & Virus Removal * Premium Services * How to Renew DEVICE SECURITY 5 MOBILE SECURITY THREATS YOU CAN PROTECT YOURSELF FROM * facebookShareLinkText * twitterShareLinkText * linkedInShareLinkText By a NortonLifeLock employee Jan. 7, 2021 Did you know that every year, the number of threats your phone encounters keeps increasing? In fact, the number of ransomware infections on mobile devices were up by a third when compared to 2017. The U.S. was the worst affected by mobile ransomware, accounting for 63 percent of infections.1 The bad news doesn’t stop there. Once your phone is hacked, your other devices may be next if they are connected. That’s because your overall online security may only be as strong as the weakest link in your chain of connected devices. Malware can spread from your hacked phone to your tablet or another mobile device through the network.2 This article identifies five mobile security threats and how you can help protect yourself from them. 1. MADWARE AND SPYWARE Madware is short for mobile adware. It’s a script or program installed on your phone, often without your consent. Its job? To collect your data for the purpose of better targeting you with ads. On top of that, madware often comes attached at the hip with spyware. Spyware collects data about you based on your internet usage and transmits it to a third party. That data is then bought and used by companies to send you advertisements. However, seeing more ads is the least of your worries when it comes to spyware. It also collects information about your location, internet usage, and even your contacts. This makes it a problem not just for you, but perhaps also for everyone you know. 2. VIRUSES AND TROJANS Viruses and Trojans can also attack your mobile devices. They typically come attached to what appear to be legitimate programs. They can then hijack your mobile device and mine the information it holds or has access to, such as your banking information. Viruses and Trojans have also been known to send premium text messages that can be costly. 3. DRIVE-BY DOWNLOADS Drive-by downloads refer to any malware installed on your device without consent. If you visit the wrong website or open the wrong email, you might be exposed to a drive-by download that automatically installs a malicious file on your mobile device. The file could be anything from adware, malware or spyware to something far more nefarious, like a bot, which can use your phone to perform malicious tasks. 4. BROWSER EXPLOITS Browser exploits take advantage of known security flaws in your mobile browser. Browser exploits also work against other applications that function with your browser, such as PDF readers. If you see that your mobile browser’s homepage or search page has unexpectedly changed, it could be a sign that you’re a victim of a browser exploit. 5. PHISHING AND GRAYWARE APPS Phishing apps are a new take on an old theme. What we are used to is criminals sending emails that appear to come from a trusted source. They ask for personal information, such as your password, hoping you’d be trusting enough to respond. Cyber crimminals have now designed phishing apps to look like real apps, and a mobile device’s smaller screen can make it even more difficult to tell the difference. These fake apps secretly collect the information you input — passwords, account numbers, and more. Grayware apps aren’t completely malicious, but they can be troublesome because they can expose users to privacy risks. In fact, Symantec found that 63 percent of grayware apps leak the affected device’s phone number and 37 percent provide device location.1 HELPING TO KEEP YOU MORE SECURE AND PRIVATE ON THE DIGITAL SUPERHIGHWAY. Get Secure VPN for online privacy and provide additional information so we can better help monitor the Dark Web and notify you if we find your information for sale there. Both features are included in your Norton 360 subscription.* Turn On Secure VPN Turn On Secure VPN Turn On Secure VPN Turn On Secure VPN Add My Info Add My Info Add My Info Add My Info HOW TO PROTECT YOURSELF FROM MOBILE SECURITY THREATS Mobile security threats may sound scary, but here are four steps you can take to help protect yourself from them. 1. Ensure that your mobile devices are protected by installing Norton protection on them. Just like computers, your mobile devices also need internet security. 2. Keep your Norton 360 mobile app updated. Your Norton software on your PC and Mac will automatically update, however you will need to update your Norton 360 mobile app with each new app release, unless your device is set up for automatic updates. Everything from your operating system to your social network apps are potential gateways for hackers to compromise your mobile device. Keeping software up to date ensures the best protection against most mobile security threats. 3. Always use a passcode on your phone. Remember that loss or physical theft of your mobile device can also compromise your information. 4. Download apps from official app stores. Both the Google Play and Apple App stores vet the apps they sell; third-party app stores don’t always. Downloading from well-known app stores may not ensure you never get a bad app, but it can help reduce your risk. By taking just a few common-sense precautions, you can help protect yourself from madware and other mobile security threats. PROTECT YOUR MOBILE DEVICES. IT'S INCLUDED IN YOUR PLAN. Download Now Download Now Download Now Download Now No one can prevent all cybercrime. * Not all features are available on all platforms. Review system requirements and complete Terms and Conditions online. ** Please note you will need an existing Norton subscription and one available seat to activate this protection. 1 Symantec, “2019 Internet Security Threat Report,” February 2019, page 41. 2 https://smallbusiness.chron.com/can-viruses-spread-over-wifi-75136.html Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners. WANT MORE? Follow us for all the latest news, tips and updates. * * * * © 2021 NortonLifeLock Inc. All rights reserved. Privacy Settings In order to provide with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience. -------------------------------------------------------------------------------- PERFORMANCE AND FUNCTIONALITY These technologies are used to enhance the performance and functionality of our websites but are non-essential to their use. However, without these cookies, certain functionality may become unavailable. > See list of performance and functionality cookies Cloudfare Cloudfront Google Fonts eGain Chat Cloudfare Amazon AWS Akamai Adobe Audience Manager Quantummetric Medallia Adobe Target -------------------------------------------------------------------------------- SOCIAL MEDIA These technologies are used to enable you to share pages and content that you find interesting on our websites through third party social networking and other websites. > See list of social media cookies Facebook Connect Facebook Youtube Pinterest LinkedIn Widget -------------------------------------------------------------------------------- ANALYTICS These technologies collect information that is used in aggregate form to help us understand how our websites are being used are being used or to help us continuously improve our websites. > See list of analytics cookies eXelate Google Tag Manager Google Analytic Twitter Analytic mPulse iSpot TV Adobe Audience Manager IO Natural Intelligence Natural Intelligence Impact Radius Tag4arm Bounce Exchange, Inc Commission Junctions OneSpot Tapad -------------------------------------------------------------------------------- ADVERTISING These technologies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests. > See list of advertising cookies GWM Google Doubleclick MediaMath, Inc. ArtSai Sizmek Yahoo Ads Rimm-Kaufman Adobe Adlens eXelate Outbrain Facebook Google Ads Bing Ads Twitter Ads Amazon Ads Bounce Ex Events Twitter Conversion Bounce Exchange, Inc Reddit Twitter Ads Twitter Conversion Tracking Yahoo Advertising Solutions Sourcepoint Proofpoint Amobee, Inc. Sourcepoint Bounce Exchange, Inc Carbon RKXD Chartable Google Optimize LinkedIn Widget Havas AddShopper LeadsRx, Inc. Podsight Sequel Response Simplifi Holdings Inc Reddit TikTok Zeta Global PayPal -------------------------------------------------------------------------------- Cancel Save WE'VE UPDATED OUR PRIVACY AND COOKIES POLICY We and our partners use cookies on this site to improve the efficiency of the navigation, perform analytics, serve more relevant advertising content to you and measure advertising performance, provide social media features, remember website preferences, and generally improve the user experience. By clicking on “Yes I agree”, you consent to these cookies. For more information on cookies, including how to manage your consent, please click on “Settings” to access our Cookie tool. ✓Yes, I agree No, take me to settings Feedback