Easy-to-use VPN for PCs, Macs, Smartphones and Tablets
A single click turns on the VPN and encrypts your connection. Install it on as many PCs, Macs, Smartphones or Tablets and depending on your device count selection, up to 10 connections can be active at the same time. Now go online at any coffee shop, airport, hotel, library or park without worry.
What is a VPN and why you need it
A Virtual Private Network helps give you online privacy and anonymity by creating a private network from a public Internet connection.
It creates a private, encrypted data tunnel that helps prevent cybercriminals from hacking into your WiFi connection and intercepting the data you are sending and receiving from your computers or mobile devices.
Without a VPN, here are a few ways your everyday online activities could leave your data vulnerable.
Man in the Middle Attacks
A Man in the Middle (MitM) attack is a form of eavesdropping. It is also one of the most common threats on public networks.
When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and vulnerabilities can allow an attacker to get in between these transmissions and "read" them. So what you thought was private no longer is.
Encryption is the process in which messages are sent between a computer and a wireless router in the form of a "secret code". These messages become unreadable unless the code is deciphered with the right key. Most routers are shipped from the factory with encryption turned off by default, and it must be turned on when the network is set up.
If an IT professional sets up the network, then chances are good that encryption has been enabled. However, there is no surefire way to tell if this has happened.
Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing it.
A software vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to target a specific vulnerability, and then inject the malware onto your device.
Snooping and Sniffing
WiFi snooping and sniffing is what it sounds like. Cybercriminals can buy specialized software kits and devices to help assist them with eavesdropping on WiFi signals.
This technique can allow the attackers to access everything that you are doing online – from viewing whole webpages that you have visited (including any information you may have filled out while visiting that web page) to being able to capture your login credentials, and even being able to hijack your accounts.
These "rogue access points" trick victims into connecting to what they think is a legitimate network because the name sounds reputable.
Say you’re staying at the Goodnight Inn and want to connect to the hotel's WiFi. You may think you're selecting the correct one when you click on "GoodNite Inn," but you haven't. Instead, you've just connected to a rogue hotspot set up by cybercriminals who can now view your sensitive information.
Why Norton Secure VPN?
As a leading consumer cyber security brand, we know that all of your data that you send and receive from your device like passwords and credit card numbers is sensitive. When you connect to a public Wi-Fi, we encrypt and convert that data into an unreadable, untraceable form until it reaches its destination, making it secure.
Now you can connect safely and privately with your PC, Mac or mobile device anywhere you go.
60-day Money Back Guarantee*
24X7 Live Customer Phone Support (English Only)
No one can prevent all cybercrime.
*Important subscription and pricing terms, offer details and disclosures here
*Important Subscription, Pricing and Offer Details:
Your subscription begins when your purchase is completed (or otherwise, when your payment is received). You must download and install on each device, or complete enrollment to get protection.
By subscribing, you are purchasing a recurring subscription which will automatically renew after the first term.
The price quoted today is valid for the first term of your subscription. After that, your subscription will be billed at the applicable monthly or annual renewal price here. The price is subject to change, but we will always send you a notification email in advance.
Your subscription may include product, service and/or protection updates and features that may be added, modified or removed subject to the acceptance of the Customer Agreement.
Available for Windows PCs, Macs, iOS and Android smartphones and tablets:
Norton Secure VPN is compatible with PCs, Macs, Android smartphones and tablets, iPads, and iPhones. Norton Secure VPN may be used on the specified number of devices – with unlimited use during the subscription term.
Windows™ Operating Systems
Microsoft Windows 10 (all versions except Windows 10S)
Microsoft Windows 8/8.1 (all versions)
Microsoft Windows 7 (all versions) with Service Pack 1 (SP 1) or later
150 MB of available hard disk space
Mac® Operating Systems
Current and previous two versions of MacOS®
150 MB of available hard disk space
Android™ Operating Systems
Androids running 4.4 or later
iOS Operating Systems
iPhones or iPads running the current and previous two versions of Apple iOS