Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Answer Line
Why spammers persist despite filters and well-informed users
Our email clients filter them out. We know all of their tricks. Yet the spam keeps coming. Here's why.Hassle-Free PC
How to securely overwrite deleted files with a built-in Windows tool
When you delete a file in Windows, you're just removing the pointer. The data is still there. Here's how to make sure that data is gone, baby, gone.Hassle-Free PC
These 3 Chrome extensions make encryption easier for everyone
Want to use encryption tools, but you find most too hard to use? Check out these Chrome-based tools aiming to take the difficulty out of protecting your data online.Hassle-Free PC
How to create an anonymous email account
It's not just dissidents looking for anoymous email, but everyday people who'd rather not reveal their true identity.Answer Line
Some files need encryption and some files don’t
Chances are you don't have to encrypt your entire hard drive. But you need to know what files to encrypt.Answer Line
Take precautions when using Gmail—or any other email service
Google's almost ubiquitous email client doesn't guarantee that your email will be private, or that your account won't be hacked. But the right precautions can give you reasonable protection.Hassle-Free PC
Five questions to answer before paying for a VPN
VPNs are great for privacy and jumping regional restrictions, but not all VPNs are created equal. Knowing some of the key differences can save you time and hassle.Answer Line
You’ve fallen for a scam! Now what?
We all make mistakes. Here's what you need to do after realizing that you have been had, and keep those mistakes from costing you.How-To
How to keep the XSS TweetDeck bug from posting on your behalf
The XSS Hole in TweetDeck is more than a nuisance. If you're a user of the popular Twitter client, here's how to protect yourself, step by step.How-To
Locked out? Get back into Windows 8 by resetting your password
A forgotten password is no need for panic. There are several ways to get back into your Windows 8 PC if you've locked yourself out.Answer Line
Can your ISP read what you send over Facebook?
Your Internet service provider knows an awful lot about you. But when you’re on Facebook, your ISP is the least of your privacy worries.Hassle-Free PC
Get two-factor authentication on the desktop with Authy
A new app lets you generate two-factor authentication codes on your desktop PC. Here's how it works.How-To
Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives
Hitting 'delete' is just the beginning. Depending on the type of storage and the sensitivity of the information, there are other things you need to do to make sure your deleted files are gone for good.Answer Line
When Tech Support calls you
Out of the blue, someone calls and tells you your computer is infected or has a problem. Maybe they claim to be from Microsoft. Here’s what you should do.Hassle-Free PC
It’s spring! Clean out your PC’s junk with these free programs
You're already cleaning up your house for the summer months, so why not extend that DIY attitude to your PC too?How-To
How to selectively delete browser history
Remove individual sites or pages from your history rather than all of it. We'll show you how in this video tip.Answer Line
Protect your privacy while you browse
Here’s how to give crooks, corporations, and governments the slip while you search the web.How-To
How to remotely log out of Gmail
If you've left Gmail logged in on another computer, there's a quick and easy fix.Answer Line
Why you don’t need to encrypt your backup
You should back up all of your data files and encrypt the sensitive ones that you don’t want other people to read. But that doesn’t mean you have to encrypt the backup.Answer Line
Watch out for photos containing malware
That adorable picture of a cute kitten may contain claws. Here's how photos on the Internet can infect your PC.Bugs & Fixes
Bugs & Fixes: Making Synology’s VPN private again
Synology updates its DiskStation Manager OS to solve a little problem with hardcoded passwords.Bugs & Fixes
Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air
Anything that makes Flash safer is good. In this case, a known exploit makes the update well worth your time.Bugs & Fixes
Bugs & Fixes: 18 vulnerabilities in IE, squashed
A seemingly quiet Patch Tuesday lumps a bucket of browser vulnerabilities into one, big item. Windows and Silverlight bugs are also squashed.Answer Line
Your IP address: Who can see it and what you can do about it
You need a visible IP address to surf the web, but you can manage some of that visibility to protect your privacy. Here's how.How-To
Bypassing content filters: How to see the web they don’t want you to see
Maybe it's your own digital content, geo-blocked overseas. Maybe it's something you're not supposed to see. These tools could get you to it, but proceed with caution.Answer Line
Use KeePass in both Windows and Android
You keep your passwords safely stored in KeePass on your Windows PC. Here's how to access them in Android, as well.How-To
How to keep your PC secure when Microsoft ends Windows XP support
If you can't cut the Windows XP cord completely, here's how to keep your computer as safe as possible once security patches go buh-bye.How-To
How to use Google Chrome’s secret guest profile feature
A new Chrome feature lets others use your browser without mucking up your bookmarks and settings.Answer Line
Can a hacker use a brute-force attack to steal an online password?
Given enough time and computing power, a brute force attack can theoretically crack any password. But is that a real threat to Internet accounts?How-To
How to protect your PC in the web’s worst neighborhoods
Shady download sites. Fake error warnings. Phishing, so much phishing. Avoid these dangers with a good security suite and an abundance of caution.How-To
How to find out if someone has been snooping in your Gmail
A hidden feature in Gmail can tell you if someone's been rummaging through your love letters. Here's where to find it.Answer Line
How to keep your neighbors from hijacking your Wi-Fi
Your Internet connection could be slow for many reasons, but you can rule out local Wi-Fi thieves by employing strong passwords and a few other strategies.Answer Line
How to recover files after a malware attack
Today’s malware can hold your precious files hostage and demand a ransom. Here’s how to get those files back.How-To
Declutter your PC for better security and more storage
Unused applications can be vulnerable to security breaches. Clean them out before they cause trouble, and jettison older data files while you're at it.Answer Line
Some password managers are safer than others
Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"How-To
Keep your laptop safe and secure while you travel
PCs make great travel companions, but you need to treat them right.Bugs & Fixes
Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer
A fix stops Java from disabling itself, and iTunes for Windows and Internet Explorer get some security tweaks.Answer Line
Disable Windows’ logon password
Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.Answer Line
What you need to know about privacy, email, and particularly Gmail
Pritesh Singh asked if anyone other than the intended recipient can view files attached to a Gmail message.Answer Line
The mysterious ~$ files–nothing to worry about
Lillian Lim noticed strange files appearing and disappearing. The file names always begin with ~$.How-To
Security to go: Three tips to keep your mobile data safe
It’s not easy keeping your devices secure, and mobile devices like smartphones, tablets, and, of course, laptops are no exception. But you can do a few things to improve your mobile security. Here’s a look at three of them.Hassle-Free PC
How to set up two-factor authentication in Evernote
Even freebie accounts can now benefit from this valuable security feature.Answer Line
Actually, you do need to share your passwords
No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.How-To
5 Wi-Fi security myths you must abandon now
Save yourself and your friends from these outdated or inaccurate security techniques, and learn the current best practices.How-To
Lockdown: How to secure your PC without going crazy
Digital privacy is within your grasp with this practical beginner's guide to encryption.Answer Line
Understanding tech language: The difference between malware and a virus
While cleaning up an infected PC, Flingwing asked the Antivirus & Security Software forum to explain the difference between malware and virusesHow-To
PC security, NSA-style: 7 tips from the spymasters
Some of the agency's countersurveillance tips are easy for anyone to implement.How-To
How to protect your PC against devious security traps
From phishers to hackers to all sorts of attackers, here's what you need to know to stay safe on the Web.How-To
How to clean and secure your browser like a pro
Ads and toolbars are the scum and villainy of the browser world. Eliminate them quickly and make sure they never come back with these simple tips.Hassle-Free PC