From spark plugs to air bags, more and more of your car's functions are being controlled by computers. But does that mean your vehicle is vulnerable to a cyberattack? Here's what you need to know about the potential risks, plus how to protect your car.
As social media websites have grown to attract people from all walks of life, they've also attracted criminal elements. Be aware of some of the tricks they use to scam you on social networking sites.
For teens with an iPhone or iPod Touch, the applications offered by the iTunes store may not be everything they want. Some teens try to "jailbreak" their devices by installing unauthorized applications. But this practice comes with risks. Here's what you should know about jailbreaking.
Upgrade or Renew Your Product
Find the latest upgrade or renewal for your product. Find Now
Access Norton Account
Get the latest product updates, view your Norton product keys, and more. Learn More
Expert Q & A
Am I creating a security risk when I leave my computer turned on and connected to the Internet 24/7? Answer
Find definitions on commonly used Internet security related terms. View Glossary