• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Future Tech
  • PCWorld Awards
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    Answer Line

    Is Your ISP Spying On You?

    Arcticsid asked the Answer Line forum if his ISP can "sit back…watch a screen, and see everything you are doing at any given time?"
    By Lincoln Spector 12 years ago
    Answer Line

    When Your PC is Likely Infected

    Joyce V's computer is having trouble with security programs–a strong indication that her computer may be infected with malware
    By Lincoln Spector 12 years ago
    How-To

    Easy Home Automation Projects for the Weekend Warrior: Part One

    This first installment in an ongoing series will cover everything you need to know about lighting control.
    By Michael Brown 12 years ago
    Answer Line

    My Twitter Account Has Been Hacked!

    GoGators complained to the Answer Line forum about his hacked Twitter account.
    By Lincoln Spector 12 years ago
    Answer Line

    My Email Account Has Been Hijacked!

    Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.
    By Lincoln Spector 12 years ago
    How-To

    Tablet Encryption 101

    Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.
    By Jason Kennedy 12 years ago
    Answer Line

    Password Protect a Flash Drive

    Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive
    By Lincoln Spector 13 years ago
    How-To

    How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)

    Your staff will be more content if they can install their choice of software. Here’s how to give them that freedom while keeping control over your IT environment.
    By David Murphy 13 years ago
    How-To

    How to Protect Your Artistic Works With a Creative Commons License

    These alternative licenses improve on existing copyright law by enabling content owners to promote the sharing and dissemination of their works.
    By Katherine Noyes 13 years ago
    How-To

    Protect Yourself From DNSChanger

    If the DNSChanger rootkit has infected your PC, you'll lose access to the Internet when the FBI shuts down DNSChanger's surrogate DNS servers. Here's how to determine whether you're infected, and what to do if you are.
    By Alex Wawro 13 years ago
    Answer Line

    Recover Encrypted Files From An Old Hard Drive

    Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.
    By Lincoln Spector 13 years ago
    How-To

    The Greatest PC Mysteries–Solved!

    PCWorld's editors band together to solve the greatest PC mysteries! Find out why your PC beeps on startup, what a .dat file is, how USB 2.0 and USB 3.0 differ, and much more!
    By PCWorld Staff 13 years ago
    How-To

    How to Encrypt Your Email

    Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
    By Eric Geier 13 years ago
    How-To

    Free Tools to Wipe Your Drives Securely

    Properly clear off old data from a flash drive, hard-disk drive, solid-state drive, or hybrid hard drive–at no cost.
    By Alex Wawro 13 years ago
    How-To

    Minimize Your Exposure to Email Spoofing

    Did someone really hijack your email address to mass-mail spam messages? Not necessarily. Here's what might have happened.
    By Tony Bradley 13 years ago
    Hassle-Free PC

    Avoid Fake Online Stores with Zscaler Safe Shopping Plug-in

    Now available for all browsers, this handy tool alerts you when you visit a bogus or compromised e-commerce site.
    By Rick Broida 13 years ago
    Answer Line

    Can I Safely Open Suspected Spam?

    C. Corder asked if it's safe to open an email that landed in the spam folder
    By Lincoln Spector 13 years ago
    Answer Line

    International Travel and Your Laptop

    Your laptop could be stolen at the airport, in your hotel, or when you're walking down a street. A few precautions should provide protection.
    By Lincoln Spector 13 years ago
    How-To

    Malicious Web Apps: How to Spot Them, How to Beat Them

    These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.
    By Tony Bradley 13 years ago
    Hassle-Free PC

    Create a Different, Secure, Easy-to-Remember Password for Every Site

    Need an easy way to generate and manage your passwords? Here's a simple trick that requires no special software.
    By Rick Broida 13 years ago
    How-To

    Secure Your Home or Office Wi-Fi

    Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.
    By Eric Geier 13 years ago
    How-To

    How to Protect Your Laptop

    Follow our guide to safeguard your laptop, as well as the data that resides on it.
    By Sarah Jacobsson Purewal 13 years ago
    How-To

    How to Become an Ethical Hacker

    Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.
    By Eric Geier 13 years ago
    How to block websites
    How-To

    How to block websites

    Blocking all users of a Windows PC from opening certain websites—no matter what browser they use or what time of day they are online—is easy if you follow this guide to tweaking your browser and router.
    By Justin Phelps 13 years ago
    Answer Line

    How Do I See Who’s Been Using My PC?

    AzharIqbal asked the Other Hardware forum how to see who else is using his computer.
    By Lincoln Spector 13 years ago
    BizFeed

    When ‘Viagra’ Comments on Your Blog, and Other Spam Red Flags

    Is a spammer just trying to use your site to boost their own web presence? Here's how to recognize a comment on your blog or website as spam, and how to stem the flow.
    By Angela West 13 years ago
    How to tell if a link is safe without clicking on it
    How-To

    How to tell if a link is safe without clicking on it

    Here's what to do with a link that looks suspicious.
    By Justin Phelps 13 years ago
    How-To

    Was Your Email Account Hacked? PwnedList Can Tell You

    Concerned about your private data in the wake of a big hack? The PwnedList website helps you find out if your online accounts were leaked during a data breach.
    By Alex Wawro 13 years ago
    Hassle-Free PC

    Root Out Rootkits with Free TDSSKiller

    Can't quite clean the malware from your PC? You might be the victim of a rootkit. Kaspersky's free utility should help.
    By Rick Broida 13 years ago
    How-To

    What Is Deep Packet Inspection?

    Though shelved for now, if legislation like SOPA and the PROTECT IP Act ever passes, it may require your ISP to start monitoring your online activity with deep packet inspection software. Make sure you understand how it works, and how you can fight back.
    By Alex Wawro 13 years ago
    BizFeed

    Five Ways to Mix Business and Personal Data on Your Smartphone

    Many people use their personal smartphones to do work. Here are five ways to access your work and personal data without carrying two handsets.
    By Joseph Fieber 13 years ago
    Security Alert

    Five Ways to Protect Your Email at Work

    Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.
    By Joseph Fieber 13 years ago
    Hassle-Free PC

    Restore Missing/Hidden Icons Wiped Out by a Virus

    Did an infection seemingly wipe out all your icons, programs, and data? Fear not: They might just be hidden. Here's how to restore them.
    By Rick Broida 13 years ago
    BizFeed

    Digital Signatures Let You Ditch That Old Fax Machine

    E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.
    By Angela West 13 years ago
    How-To

    How to Keep Your PC Safe With Sandboxing

    Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.
    By Eric Geier 13 years ago
    How-To

    Anatomy of an ATM Skimmer Scam

    Skimmers could steal your financial information at the ATM—or even at your local supermarket. Here's how to protect yourself.
    By David Daw 13 years ago
    Answer Line

    Can My Neighbor and I Share an Internet Connection?

    John asked if he and his neighbor could share one Internet access account
    By Lincoln Spector 13 years ago
    How-To

    Play Hard, Stay Safe

    You still need to keep data security in mind when playing games online, as recent in­­cidents have shown. To that end, here are some safeguards you can take.
    By Nick Mediati 13 years ago
    BizFeed

    10 Nightmares When Traveling With Tech–and How to Prevent Them

    When traveling with smartphones, tablets, and laptops, a small hiccup can derail work for your entire trip. How can you avoid these nightmares on your next business trip?
    By Angela West 13 years ago
    How-To

    Do You Speak Securitese? Five Security Terms You Should Know

    Knowing these terms won’t make you a security expert—but they’ll provide a good head start on the jargon.
    By Nick Mediati 13 years ago
    Answer Line

    Why is Taskhost Consuming So Much of My CPU?

    Mashoreen asked the Answer Line forum why taskhost.exe–usually a small background application–was consuming 50-percent of his CPU.
    By Lincoln Spector 13 years ago
    Security Alert

    7 Ways to Protect Your Printers

    Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.
    By Joseph Fieber 13 years ago
    How-To

    How to Lock Down Your Wireless Network

    Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.
    By Alex Wawro 13 years ago
    How-To

    Wireless Networking 101

    Setting up and maintaining a home Wi-Fi network can be a daunting task for a PC newbie. These four how-to guides will run you through some of the basics.
    By Patrick Miller 13 years ago
    Answer Line

    How Safe is WPA2-Secured WiFi?

    Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking
    By Lincoln Spector 13 years ago
    How-To

    Lock Down Your Wi-Fi Network: 8 Tips for Small Businesses

    By default, Wi-Fi is not secure. But these best practices will help you lock down and encrypt your company's wireless connections, both in and out of the office.
    By Eric Geier 13 years ago
    How-To

    How To Lock Down Your Wireless Network

    Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.
    By Alex Wawro 13 years ago
    Answer Line

    Remove Hard-to-Kill Malware

    Jane13434's PC is infected with something that three good security programs couldn't defeat.
    By Lincoln Spector 13 years ago
    How-To

    Get Started Managing Multiple PCs with Windows Intune

    Discover Microsoft’s new cloud-based service to remotely secure, monitor, manage, and assist PCs via the Internet. Check out the features and see how to get started.
    By Eric Geier 13 years ago
    Answer Line

    Why You Need a Router

    ZyrrahXD asked the Networking forum about the best way to split a home Internet connection between multiple computers
    By Lincoln Spector 13 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 12 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page