• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Future Tech
  • PCWorld Awards
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    HTTPS errors: What to do when your PC freaks out
    Hassle-Free PC

    HTTPS errors: What to do when your PC freaks out

    Connection errors are annoying, but they usually require a simple fix.
    By Ian Paul 9 years ago
    How to encrypt and password-protect ZIP files the right way
    Answer Line

    How to encrypt and password-protect ZIP files the right way

    You can protect the contents of a ZIP file, but unless you know the trick, you might as well not bother.
    By Lincoln Spector 9 years ago
    The quick and easy way to find the best antivirus software
    Hassle-Free PC

    The quick and easy way to find the best antivirus software

    Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.
    By Ian Paul 9 years ago
    Answer Line

    Your mobile IP address: Its safety is one thing, its privacy is another

    Your mobile IP address isn't likely to be stolen. But you still need to take precautions.
    By Lincoln Spector 9 years ago
    Security Measures

    Trust no one: How caller ID spoofing has ruined the simple phone call

    Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
    By Robert Lemos 9 years ago
    Answer Line

    Cloud storage alternatives: Three ways to sync your own data securely and privately

    Cloud storage is convenient, but you can remove any concerns about security or other issues if you do what they do yourself.
    By Lincoln Spector 9 years ago
    Security Measures

    The 3-step plan to make your website harder to hack

    Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
    By Robert Lemos 9 years ago
    Security Measures

    NFC security: 3 ways to avoid being hacked

    More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
    By Robert Lemos 10 years ago
    Answer Line

    The dangers of Android malware may be exaggerated, but you should still play it safe

    Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.
    By Lincoln Spector 10 years ago
    Security Measures

    5 steps to keep your smart home from being hacked

    Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
    By Robert Lemos 10 years ago
    Five precautions for avoiding malware when you download and install software
    Answer Line

    Five precautions for avoiding malware when you download and install software

    Downloading a little-known program can be scary. Take these steps to protect yourself.
    By Lincoln Spector 10 years ago
    Security Measures

    How to prevent mobile malware in 3 easy steps

    Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
    By Robert Lemos 10 years ago
    Hassle-Free PC

    How to easily secure your web browsing with TunnelBear’s free Chrome extension

    Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.
    By Ian Paul 10 years ago
    Answer Line

    You can securely wipe your files, hard drive or SSD with one of these free utilities

    You delete a file, then empty the recycle bin. But the contents of that file remains on your drive. Here's what to do about that.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Sick of Netflix’s available shows? Use a VPN to change your country and see more

    There may be some risk, but if you're interested you can check out the Netflix movie selection in countries around the world.
    By Ian Paul 10 years ago
    How to download your entire Google search history
    How-To

    How to download your entire Google search history

    Want a copy of your personal Google search history for your very own? Now you can export and download it, though it's in a funky file format.
    By Ian Paul 10 years ago
    Answer Line

    What to do if someone steals your IP address

    Maybe there's weird activity on your home network. Maybe your ISP's asking about illegal online dealings. That's when you need to check your IP address.
    By Lincoln Spector 10 years ago
    Answer Line

    Prepare to take your laptop to another country

    Planning a trip overseas with your laptop? These precautions will help with smooth sailing.
    By Lincoln Spector 10 years ago
    Answer Line

    Recover a stolen laptop, or prepare for the day your laptop is stolen

    You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.
    By Lincoln Spector 10 years ago
    Updated

    How to remove the dangerous Superfish adware preinstalled on Lenovo PCs

    Lenovo has been preloading new consumer PCs with Superfish adware that injects ads and hijacks the secure HTTPS encryption of every site you visit. Eradicating the threat isn't easy, but here's how, complete with a new automated tool.
    By Brad Chacos 10 years ago
    Answer Line

    How to protect your wireless router from malware

    Your PC and your phone aren't the only devices that can catch an infection. The router that connects them to the Internet may also be vulnerable.
    By Lincoln Spector 10 years ago
    How-To

    How to automatically unlock your Chromebook when your Android phone’s nearby

    If you have an Android 5.0 Lollipop phone, Smart Lock eliminates the need to re-type your password every time you want to fire up your Chromebook.
    By Derek Walter 10 years ago
    Answer Line

    How to handle a Facebook bully or stalker

    Bad people stalk the social network. Here's what you need to do if someone continually gives you trouble.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    VPNs made easy: 3 services with one-click desktop apps

    Choosing the right VPN for you is hard enough. Why make it harder by having to muck about with network settings?
    By Ian Paul 10 years ago
    Hassle-Free PC

    4 easy ways to cut your software costs in 2015

    Are you paying money for software when perfectly good free alternatives exist? Here are four areas to consider dumping your annual software payments with solid free alternatives.
    By Ian Paul 10 years ago
    Take precautions when using public Wi-Fi networks
    Answer Line

    Take precautions when using public Wi-Fi networks

    When you take your laptop to a library or café, you take a risk. But if you know what you're doing, you can minimize that risk.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Three security-boosting steps to perform on every router

    If you haven't done this with your router yet, do so STAT to make sure it's nice and secure.
    By Ian Paul 10 years ago
    Answer Line

    Keep encrypted files encrypted when you back them up to the cloud

    You keep selected files or folders encrypted on your internal drive. But are they protected when you use an online backup service?
    By Lincoln Spector 10 years ago
    How-To

    Travel safely with your tech: How to prevent theft, loss and snooping on the road

    All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.
    By Chris Hoffman 10 years ago
    Answer Line

    Does your computer have malware? Here are the telltale signs

    Viruses, Trojans, and worms, oh, my! These symptoms are warning signs that you might have an infected PC.
    By Lincoln Spector 10 years ago
    How-To

    How to protect yourself from PC tech support scams

    In the third time since 2011, the U.S. Federal Trade Commission has shut down another operation selling bogus tech support to Windows PC owners.
    By Ian Paul 10 years ago
    Smart Mobile Tricks

    How to stop SMS spam on your Android or iOS phone

    SMS spam is proliferating fast, but your phone's settings or a handy app can help stem the tide.
    By Ben Patterson 10 years ago
    Answer Line

    BadUSB: What you can do about undetectable malware on a flash drive

    We've known for years that malware can spread via portable storage. But BadUSB shows that scanning the drive may not be sufficient.
    By Lincoln Spector 10 years ago
    Answer Line

    How to encrypt sensitive data? Put it in an encrypted container

    We all have files that we'd rather not share with hackers and thieves (and maybe even our spouses). Here's how to put them in a place where no one else can open them.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Need help? Microsoft Stores offer free tech support, PC tune-ups, malware removal

    If you've got a problem with your PC. The Microsoft Store may be able to fix it for you for free.
    By Ian Paul 10 years ago
    How-To

    Safe from Shellshock: How to protect your home computer from the Bash shell bug

    The 'Shellshock' Bash shell bug is a big deal, but it's relatively easy to keep your home PC safe.
    By Brad Chacos 10 years ago
    Answer Line

    The 6 essential Windows software programs for any PC

    No matter what else you do on your PC, everyone needs basic programs that cover security, web browsing, and backup.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Three warning signs that email is malicious

    You can't always count on your spam filter to keep you safe. For those times, it pays to keep your scam sleuthing skills sharp.
    By Ian Paul 10 years ago
    How-To

    These 5 antivirus suites keep potentially unwanted programs (PUPs) from biting

    Potentially unwanted programs (PUPs) pack a nasty bite if left unchecked. The antivirus suite you already have may be able to catch and muzzle them.
    By Eric Geier 10 years ago
    How-To

    How to keep your sexy selfies (and other sensitive files) safe in the cloud

    Whether you're storing old tax returns or the occasional naughty photo, some files deserve some extra security. Here's how to keep them private.
    By Alex Campbell 10 years ago
    Answer Line

    What happens when Microsoft ends Windows 7 mainstream support next year

    Next January, Microsoft will end mainstream support for Windows 7. But relax. That won't be end of the popular operating system.
    By Lincoln Spector 10 years ago
    Answer Line

    One of the best password managers for your PC, devices, and the cloud

    You need a password manager; it's as important as antivirus. KeePass can do the job on all of your devices.
    By Lincoln Spector 10 years ago
    How-To

    How to use OpenPGP to encrypt your email messages and files in the cloud

    When online services lack privacy controls, you can roll your own using near military-grade encryption.
    By Eric Geier 10 years ago
    Answer Line

    How to use Gmail 2-step verification on multiple devices

    You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices.
    By Lincoln Spector 10 years ago
    Answer Line

    Why spammers persist despite filters and well-informed users

    Our email clients filter them out. We know all of their tricks. Yet the spam keeps coming. Here's why.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    How to securely overwrite deleted files with a built-in Windows tool

    When you delete a file in Windows, you're just removing the pointer. The data is still there. Here's how to make sure that data is gone, baby, gone.
    By Ian Paul 10 years ago
    Hassle-Free PC

    These 3 Chrome extensions make encryption easier for everyone

    Want to use encryption tools, but you find most too hard to use? Check out these Chrome-based tools aiming to take the difficulty out of protecting your data online.
    By Ian Paul 10 years ago
    How to create an anonymous email account
    Hassle-Free PC

    How to create an anonymous email account

    It's not just dissidents looking for anoymous email, but everyday people who'd rather not reveal their true identity.
    By Ian Paul 10 years ago
    Answer Line

    Some files need encryption and some files don’t

    Chances are you don't have to encrypt your entire hard drive. But you need to know what files to encrypt.
    By Lincoln Spector 10 years ago
    Answer Line

    Take precautions when using Gmail—or any other email service

    Google's almost ubiquitous email client doesn't guarantee that your email will be private, or that your account won't be hacked. But the right precautions can give you reasonable protection.
    By Lincoln Spector 11 years ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 12 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page