• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Future Tech
  • PCWorld Awards
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    Hassle-Free PC

    Five questions to answer before paying for a VPN

    VPNs are great for privacy and jumping regional restrictions, but not all VPNs are created equal. Knowing some of the key differences can save you time and hassle.
    By Ian Paul 11 years ago
    Answer Line

    You’ve fallen for a scam! Now what?

    We all make mistakes. Here's what you need to do after realizing that you have been had, and keep those mistakes from costing you.
    By Lincoln Spector 11 years ago
    How-To

    How to keep the XSS TweetDeck bug from posting on your behalf

    The XSS Hole in TweetDeck is more than a nuisance. If you're a user of the popular Twitter client, here's how to protect yourself, step by step.
    By Jim Norris 11 years ago
    Locked out? Get back into Windows 8 by resetting your password
    How-To

    Locked out? Get back into Windows 8 by resetting your password

    A forgotten password is no need for panic. There are several ways to get back into your Windows 8 PC if you've locked yourself out.
    By Eric Geier 11 years ago
    Answer Line

    Can your ISP read what you send over Facebook?

    Your Internet service provider knows an awful lot about you. But when you’re on Facebook, your ISP is the least of your privacy worries.
    By Lincoln Spector 11 years ago
    Hassle-Free PC

    Get two-factor authentication on the desktop with Authy

    A new app lets you generate two-factor authentication codes on your desktop PC. Here's how it works.
    By Ian Paul 11 years ago
    How-To

    Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives

    Hitting 'delete' is just the beginning. Depending on the type of storage and the sensitivity of the information, there are other things you need to do to make sure your deleted files are gone for good.
    By Chris Hoffman 11 years ago
    Answer Line

    When Tech Support calls you

    Out of the blue, someone calls and tells you your computer is infected or has a problem. Maybe they claim to be from Microsoft. Here’s what you should do.
    By Lincoln Spector 11 years ago
    Hassle-Free PC

    It’s spring! Clean out your PC’s junk with these free programs

    You're already cleaning up your house for the summer months, so why not extend that DIY attitude to your PC too?
    By Ian Paul 11 years ago
    How to selectively delete browser history
    How-To

    How to selectively delete browser history

    Remove individual sites or pages from your history rather than all of it. We'll show you how in this video tip.
    By Nick Barber 11 years ago
    Answer Line

    Protect your privacy while you browse

    Here’s how to give crooks, corporations, and governments the slip while you search the web.
    By Lincoln Spector 11 years ago
    How to remotely log out of Gmail
    How-To

    How to remotely log out of Gmail

    If you've left Gmail logged in on another computer, there's a quick and easy fix.
    By Nick Barber 11 years ago
    Answer Line

    Why you don’t need to encrypt your backup

    You should back up all of your data files and encrypt the sensitive ones that you don’t want other people to read. But that doesn’t mean you have to encrypt the backup.
    By Lincoln Spector 11 years ago
    Answer Line

    Watch out for photos containing malware

    That adorable picture of a cute kitten may contain claws. Here's how photos on the Internet can infect your PC.
    By Lincoln Spector 11 years ago
    Bugs & Fixes

    Bugs & Fixes: Making Synology’s VPN private again

    Synology updates its DiskStation Manager OS to solve a little problem with hardcoded passwords.
    By Jon L. Jacobi 11 years ago
    Bugs & Fixes

    Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air

    Anything that makes Flash safer is good. In this case, a known exploit makes the update well worth your time.
    By Jon L. Jacobi 11 years ago
    Bugs & Fixes

    Bugs & Fixes: 18 vulnerabilities in IE, squashed

    A seemingly quiet Patch Tuesday lumps a bucket of browser vulnerabilities into one, big item. Windows and Silverlight bugs are also squashed.
    By Jon L. Jacobi 11 years ago
    Answer Line

    Your IP address: Who can see it and what you can do about it

    You need a visible IP address to surf the web, but you can manage some of that visibility to protect your privacy. Here's how.
    By Lincoln Spector 11 years ago
    How-To

    Bypassing content filters: How to see the web they don’t want you to see

    Maybe it's your own digital content, geo-blocked overseas. Maybe it's something you're not supposed to see. These tools could get you to it, but proceed with caution.
    By Chris Hoffman 11 years ago
    Answer Line

    Use KeePass in both Windows and Android

    You keep your passwords safely stored in KeePass on your Windows PC. Here's how to access them in Android, as well.
    By Lincoln Spector 11 years ago
    How-To

    How to keep your PC secure when Microsoft ends Windows XP support

    If you can't cut the Windows XP cord completely, here's how to keep your computer as safe as possible once security patches go buh-bye.
    By Chris Hoffman 11 years ago
    How-To

    How to use Google Chrome’s secret guest profile feature

    A new Chrome feature lets others use your browser without mucking up your bookmarks and settings.
    By Ian Paul 11 years ago
    Answer Line

    Can a hacker use a brute-force attack to steal an online password?

    Given enough time and computing power, a brute force attack can theoretically crack any password. But is that a real threat to Internet accounts?
    By Lincoln Spector 11 years ago
    How-To

    How to protect your PC in the web’s worst neighborhoods

    Shady download sites. Fake error warnings. Phishing, so much phishing. Avoid these dangers with a good security suite and an abundance of caution.
    By Alex Castle 11 years ago
    How-To

    How to find out if someone has been snooping in your Gmail

    A hidden feature in Gmail can tell you if someone's been rummaging through your love letters. Here's where to find it.
    By Nick Mediati 11 years ago
    How to keep your neighbors from hijacking your Wi-Fi
    Answer Line

    How to keep your neighbors from hijacking your Wi-Fi

    Your Internet connection could be slow for many reasons, but you can rule out local Wi-Fi thieves by employing strong passwords and a few other strategies.
    By Lincoln Spector 11 years ago
    Answer Line

    How to recover files after a malware attack

    Today’s malware can hold your precious files hostage and demand a ransom. Here’s how to get those files back.
    By Lincoln Spector 11 years ago
    How-To

    Declutter your PC for better security and more storage

    Unused applications can be vulnerable to security breaches. Clean them out before they cause trouble, and jettison older data files while you're at it.
    By Tony Bradley 11 years ago
    Answer Line

    Some password managers are safer than others

    Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"
    By Lincoln Spector 11 years ago
    How-To

    Keep your laptop safe and secure while you travel

    PCs make great travel companions, but you need to treat them right.
    By Alex Cocilova 11 years ago
    Bugs & Fixes

    Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer

    A fix stops Java from disabling itself, and iTunes for Windows and Internet Explorer get some security tweaks.
    By Jon L. Jacobi 11 years ago
    Answer Line

    Disable Windows’ logon password

    Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.
    By Lincoln Spector 11 years ago
    Answer Line

    What you need to know about privacy, email, and particularly Gmail

    Pritesh Singh asked if anyone other than the intended recipient can view files attached to a Gmail message.
    By Lincoln Spector 11 years ago
    Answer Line

    The mysterious ~$ files–nothing to worry about

    Lillian Lim noticed strange files appearing and disappearing. The file names always begin with ~$.
    By Lincoln Spector 11 years ago
    How-To

    Security to go: Three tips to keep your mobile data safe

    It’s not easy keeping your devices secure, and mobile devices like smartphones, tablets, and, of course, laptops are no exception. But you can do a few things to improve your mobile security. Here’s a look at three of them.
    By Ian Paul 11 years ago
    Hassle-Free PC

    How to set up two-factor authentication in Evernote

    Even freebie accounts can now benefit from this valuable security feature.
    By Rick Broida 11 years ago
    Answer Line

    Actually, you do need to share your passwords

    No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.
    By Lincoln Spector 11 years ago
    How-To

    5 Wi-Fi security myths you must abandon now

    Save yourself and your friends from these outdated or inaccurate security techniques, and learn the current best practices.
    By Eric Geier 11 years ago
    How-To

    Lockdown: How to secure your PC without going crazy

    Digital privacy is within your grasp with this practical beginner's guide to encryption.
    By Ian Paul 11 years ago
    Answer Line

    Understanding tech language: The difference between malware and a virus

    While cleaning up an infected PC, Flingwing asked the Antivirus & Security Software forum to explain the difference between malware and viruses
    By Lincoln Spector 11 years ago
    How-To

    PC security, NSA-style: 7 tips from the spymasters

    Some of the agency's countersurveillance tips are easy for anyone to implement.
    By Paul Mah 11 years ago
    How-To

    How to protect your PC against devious security traps

    From phishers to hackers to all sorts of attackers, here's what you need to know to stay safe on the Web.
    By Brad Chacos 11 years ago
    How-To

    How to clean and secure your browser like a pro

    Ads and toolbars are the scum and villainy of the browser world. Eliminate them quickly and make sure they never come back with these simple tips.
    By Eric Geier 11 years ago
    Hassle-Free PC

    Why I’m turning over password management to Dashlane

    This utility is so good, I'm even going to pay for the premium version.
    By Rick Broida 11 years ago
    How-To

    Tech Tip: Getting a password manager

    Having a hard time keeping all your password information straight? A password manager can take the guesswork out of logging in.
    By Kerry Davis 11 years ago
    Answer Line

    Put your passwords in your pocket and take them everywhere you go

    Password managers help you keep more passwords than you can memorize. Eric asked if he could carry one on a flash drive.
    By Lincoln Spector 11 years ago
    Here’s what an eavesdropper sees when you use an unsecured Wi-Fi hotspot
    How-To

    Here’s what an eavesdropper sees when you use an unsecured Wi-Fi hotspot

    Use unsecured public Wi-Fi hotspots much? You'll rethink that practice after we show you what can be captured from those connections.
    By Eric Geier 12 years ago
    How-To

    Five essential security measures to protect your business—no matter its size

    Take these basic steps to safeguard your business's invaluable information assets.
    By Paul Mah 12 years ago
    How-To

    How to child-proof the Internet

    Child predators, pornography, online bullying—kids can stumble into all sorts of trouble online. Make sure your PC, mobile devices, and social networks are safe with these simple tips.
    By Eric Geier 12 years ago
    Answer Line

    Manage passwords, and not just on the Web

    Mgentry2 asked the Windows forum to recommend password managers that can " keep track of both online passwords and desktop application passwords (Outlook, Quicken, etc.)."
    By Lincoln Spector 12 years ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 12 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page