From spark plugs to air bags, more and more of your car's functions are being controlled by computers. But does that mean your vehicle is vulnerable to a cyberattack? Here's what you need to know about the potential risks, plus how to protect your car.
As social media websites have grown to attract people from all walks of life, they've also attracted criminal elements. Be aware of some of the tricks they use to scam you on social networking sites.
For teens with an iPhone or iPod Touch, the applications offered by the iTunes store may not be everything they want. Some teens try to "jailbreak" their devices by installing unauthorized applications. But this practice comes with risks. Here's what you should know about jailbreaking.
Welcome to the newly redesigned Security Resource center.
Get easy access to articles, the Norton community, and links to product support and upgrades.
Expert Q & A
Am I creating a security risk when I leave my computer turned on and connected to the Internet 24/7? Answer
Find definitions on commonly used Internet security related terms. View Glossary