Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Answer Line
Learn to use strong passwords
Passwords protect every part of your online life. If you don't treat them properly, you're exposing yourself to a whole mess of trouble.Answer Line
Can I recover a stolen laptop?
Justin Yuen asked if it's possible to recover a stolen laptop.How-To
How to encrypt your cloud storage for free
BoxCryptor is a freemium, easy-to-use encryption program that can help you keep your data private in the cloud.Answer Line
Safely send private information over the Internet
KenWid10 asked the Antivirus & Security Software forum how best to send encrypted information to someone over the InternetHow-To
How to find happiness in a world of password madness
In the grand scheme of digital security, passwords have become self-defeating, often impotent tools. We need too many of them, and the strong ones are too hard to remember. Luckily, however, you can improve today's passwords with proper management, and tomorrow's security tech may eliminate passwords completely.Answer Line
Does the Windows logon password protect your data?
After discovering how easy it is to recover data from a hard drive removed from one PC and attached to another, Melker asked the Hard Drives, NAS Drives, Storage forum if password protecting Windows actually protects your data.Answer Line
Is Your ISP Spying On You?
Arcticsid asked the Answer Line forum if his ISP can "sit back…watch a screen, and see everything you are doing at any given time?"Answer Line
When Your PC is Likely Infected
Joyce V's computer is having trouble with security programs–a strong indication that her computer may be infected with malwareHow-To
Easy Home Automation Projects for the Weekend Warrior: Part One
This first installment in an ongoing series will cover everything you need to know about lighting control.Answer Line
My Twitter Account Has Been Hacked!
GoGators complained to the Answer Line forum about his hacked Twitter account.Answer Line
My Email Account Has Been Hijacked!
Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.How-To
Tablet Encryption 101
Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.Answer Line
Password Protect a Flash Drive
Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash driveHow-To
How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)
Your staff will be more content if they can install their choice of software. Here’s how to give them that freedom while keeping control over your IT environment.How-To
How to Protect Your Artistic Works With a Creative Commons License
These alternative licenses improve on existing copyright law by enabling content owners to promote the sharing and dissemination of their works.How-To
Protect Yourself From DNSChanger
If the DNSChanger rootkit has infected your PC, you'll lose access to the Internet when the FBI shuts down DNSChanger's surrogate DNS servers. Here's how to determine whether you're infected, and what to do if you are.Answer Line
Recover Encrypted Files From An Old Hard Drive
Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.How-To
The Greatest PC Mysteries–Solved!
PCWorld's editors band together to solve the greatest PC mysteries! Find out why your PC beeps on startup, what a .dat file is, how USB 2.0 and USB 3.0 differ, and much more!How-To
How to Encrypt Your Email
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.How-To
Free Tools to Wipe Your Drives Securely
Properly clear off old data from a flash drive, hard-disk drive, solid-state drive, or hybrid hard drive–at no cost.How-To
Minimize Your Exposure to Email Spoofing
Did someone really hijack your email address to mass-mail spam messages? Not necessarily. Here's what might have happened.Hassle-Free PC
Avoid Fake Online Stores with Zscaler Safe Shopping Plug-in
Now available for all browsers, this handy tool alerts you when you visit a bogus or compromised e-commerce site.Answer Line
Can I Safely Open Suspected Spam?
C. Corder asked if it's safe to open an email that landed in the spam folderAnswer Line
International Travel and Your Laptop
Your laptop could be stolen at the airport, in your hotel, or when you're walking down a street. A few precautions should provide protection.How-To
Malicious Web Apps: How to Spot Them, How to Beat Them
These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.Hassle-Free PC
Create a Different, Secure, Easy-to-Remember Password for Every Site
Need an easy way to generate and manage your passwords? Here's a simple trick that requires no special software.How-To
Secure Your Home or Office Wi-Fi
Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.How-To
How to Protect Your Laptop
Follow our guide to safeguard your laptop, as well as the data that resides on it.How-To
How to Become an Ethical Hacker
Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.How-To
How to block websites
Blocking all users of a Windows PC from opening certain websites—no matter what browser they use or what time of day they are online—is easy if you follow this guide to tweaking your browser and router.Answer Line
How Do I See Who’s Been Using My PC?
AzharIqbal asked the Other Hardware forum how to see who else is using his computer.BizFeed
When ‘Viagra’ Comments on Your Blog, and Other Spam Red Flags
Is a spammer just trying to use your site to boost their own web presence? Here's how to recognize a comment on your blog or website as spam, and how to stem the flow.How-To
How to tell if a link is safe without clicking on it
Here's what to do with a link that looks suspicious.How-To
Was Your Email Account Hacked? PwnedList Can Tell You
Concerned about your private data in the wake of a big hack? The PwnedList website helps you find out if your online accounts were leaked during a data breach.Hassle-Free PC
Root Out Rootkits with Free TDSSKiller
Can't quite clean the malware from your PC? You might be the victim of a rootkit. Kaspersky's free utility should help.How-To
What Is Deep Packet Inspection?
Though shelved for now, if legislation like SOPA and the PROTECT IP Act ever passes, it may require your ISP to start monitoring your online activity with deep packet inspection software. Make sure you understand how it works, and how you can fight back.BizFeed
Five Ways to Mix Business and Personal Data on Your Smartphone
Many people use their personal smartphones to do work. Here are five ways to access your work and personal data without carrying two handsets.Security Alert
Five Ways to Protect Your Email at Work
Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.Hassle-Free PC
Restore Missing/Hidden Icons Wiped Out by a Virus
Did an infection seemingly wipe out all your icons, programs, and data? Fear not: They might just be hidden. Here's how to restore them.BizFeed
Digital Signatures Let You Ditch That Old Fax Machine
E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.How-To
How to Keep Your PC Safe With Sandboxing
Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.How-To
Anatomy of an ATM Skimmer Scam
Skimmers could steal your financial information at the ATM—or even at your local supermarket. Here's how to protect yourself.Answer Line
Can My Neighbor and I Share an Internet Connection?
John asked if he and his neighbor could share one Internet access accountHow-To
Play Hard, Stay Safe
You still need to keep data security in mind when playing games online, as recent incidents have shown. To that end, here are some safeguards you can take.BizFeed
10 Nightmares When Traveling With Tech–and How to Prevent Them
When traveling with smartphones, tablets, and laptops, a small hiccup can derail work for your entire trip. How can you avoid these nightmares on your next business trip?How-To
Do You Speak Securitese? Five Security Terms You Should Know
Knowing these terms won’t make you a security expert—but they’ll provide a good head start on the jargon.Answer Line
Why is Taskhost Consuming So Much of My CPU?
Mashoreen asked the Answer Line forum why taskhost.exe–usually a small background application–was consuming 50-percent of his CPU.Security Alert
7 Ways to Protect Your Printers
Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.How-To
How to Lock Down Your Wireless Network
Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.How-To