Why Security Updates Are Vital
When it comes to security software, ignoring updates can have serious consequences.
Social Networking Scams
Read about scams people run into on social networks.
Head in the Cloud
Norton explains cloud computing and shows its benefits.
Social Networking Safety
Be careful what you post when you're socializing online.
Having "The Talk" with Your Kids
What's the best way to open a discussion with your children about online safety?
What to Do If You’re a Victim
Learn how to respond to and recover from cybercrime.
Protecting Your Phone and Tablet from Loss, Theft and Attacks
Let’s take a closer look at some precautions and mobile security factoids.
Wi-Fi Hotspots: Connecting While Traveling
Learn how to protect yourself when you connect wirelessly in public.
The Typical Trickery of Teen Hackers
Check out these tricks teens use to get past protective settings.
The Vulnerabilities of VoIP
VoIP phone service is prone to vulnerabilities that you never had to worry about with traditional phone lines.
Spear Phishing: Scam, Not Sport
The latest twist on phishing is spear phishing.
Security Beyond the Box: How Symantec Maps Your Way to Safe Computing
Symantec's Global Intelligence Network leads the way to safe computing.
Internet Security Glossary
Learn your Internet security ABCs with this glossary of terms.
Spam, Spam, Go Away
Learn the different types of spam and how to protect yourself from these sometimes dangerous nuisances.