• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Smart Tech
    • Software
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Tech
    • Software
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Smart Tech
    • Software
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Back to School
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    Answer Line

    Why spammers persist despite filters and well-informed users

    Our email clients filter them out. We know all of their tricks. Yet the spam keeps coming. Here's why.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    How to securely overwrite deleted files with a built-in Windows tool

    When you delete a file in Windows, you're just removing the pointer. The data is still there. Here's how to make sure that data is gone, baby, gone.
    By Ian Paul 10 years ago
    Hassle-Free PC

    These 3 Chrome extensions make encryption easier for everyone

    Want to use encryption tools, but you find most too hard to use? Check out these Chrome-based tools aiming to take the difficulty out of protecting your data online.
    By Ian Paul 10 years ago
    How to create an anonymous email account
    Hassle-Free PC

    How to create an anonymous email account

    It's not just dissidents looking for anoymous email, but everyday people who'd rather not reveal their true identity.
    By Ian Paul 10 years ago
    Answer Line

    Some files need encryption and some files don’t

    Chances are you don't have to encrypt your entire hard drive. But you need to know what files to encrypt.
    By Lincoln Spector 10 years ago
    Answer Line

    Take precautions when using Gmail—or any other email service

    Google's almost ubiquitous email client doesn't guarantee that your email will be private, or that your account won't be hacked. But the right precautions can give you reasonable protection.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Five questions to answer before paying for a VPN

    VPNs are great for privacy and jumping regional restrictions, but not all VPNs are created equal. Knowing some of the key differences can save you time and hassle.
    By Ian Paul 10 years ago
    Answer Line

    You’ve fallen for a scam! Now what?

    We all make mistakes. Here's what you need to do after realizing that you have been had, and keep those mistakes from costing you.
    By Lincoln Spector 10 years ago
    How-To

    How to keep the XSS TweetDeck bug from posting on your behalf

    The XSS Hole in TweetDeck is more than a nuisance. If you're a user of the popular Twitter client, here's how to protect yourself, step by step.
    By Jim Norris 10 years ago
    Locked out? Get back into Windows 8 by resetting your password
    How-To

    Locked out? Get back into Windows 8 by resetting your password

    A forgotten password is no need for panic. There are several ways to get back into your Windows 8 PC if you've locked yourself out.
    By Eric Geier 10 years ago
    Answer Line

    Can your ISP read what you send over Facebook?

    Your Internet service provider knows an awful lot about you. But when you’re on Facebook, your ISP is the least of your privacy worries.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Get two-factor authentication on the desktop with Authy

    A new app lets you generate two-factor authentication codes on your desktop PC. Here's how it works.
    By Ian Paul 10 years ago
    How-To

    Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives

    Hitting 'delete' is just the beginning. Depending on the type of storage and the sensitivity of the information, there are other things you need to do to make sure your deleted files are gone for good.
    By Chris Hoffman 10 years ago
    Answer Line

    When Tech Support calls you

    Out of the blue, someone calls and tells you your computer is infected or has a problem. Maybe they claim to be from Microsoft. Here’s what you should do.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    It’s spring! Clean out your PC’s junk with these free programs

    You're already cleaning up your house for the summer months, so why not extend that DIY attitude to your PC too?
    By Ian Paul 10 years ago
    How to selectively delete browser history
    How-To

    How to selectively delete browser history

    Remove individual sites or pages from your history rather than all of it. We'll show you how in this video tip.
    By Nick Barber 10 years ago
    Answer Line

    Protect your privacy while you browse

    Here’s how to give crooks, corporations, and governments the slip while you search the web.
    By Lincoln Spector 10 years ago
    How to remotely log out of Gmail
    How-To

    How to remotely log out of Gmail

    If you've left Gmail logged in on another computer, there's a quick and easy fix.
    By Nick Barber 10 years ago
    Answer Line

    Why you don’t need to encrypt your backup

    You should back up all of your data files and encrypt the sensitive ones that you don’t want other people to read. But that doesn’t mean you have to encrypt the backup.
    By Lincoln Spector 10 years ago
    Answer Line

    Watch out for photos containing malware

    That adorable picture of a cute kitten may contain claws. Here's how photos on the Internet can infect your PC.
    By Lincoln Spector 10 years ago
    Bugs & Fixes

    Bugs & Fixes: Making Synology’s VPN private again

    Synology updates its DiskStation Manager OS to solve a little problem with hardcoded passwords.
    By Jon L. Jacobi 10 years ago
    Bugs & Fixes

    Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air

    Anything that makes Flash safer is good. In this case, a known exploit makes the update well worth your time.
    By Jon L. Jacobi 11 years ago
    Bugs & Fixes

    Bugs & Fixes: 18 vulnerabilities in IE, squashed

    A seemingly quiet Patch Tuesday lumps a bucket of browser vulnerabilities into one, big item. Windows and Silverlight bugs are also squashed.
    By Jon L. Jacobi 11 years ago
    Answer Line

    Your IP address: Who can see it and what you can do about it

    You need a visible IP address to surf the web, but you can manage some of that visibility to protect your privacy. Here's how.
    By Lincoln Spector 11 years ago
    How-To

    Bypassing content filters: How to see the web they don’t want you to see

    Maybe it's your own digital content, geo-blocked overseas. Maybe it's something you're not supposed to see. These tools could get you to it, but proceed with caution.
    By Chris Hoffman 11 years ago
    Answer Line

    Use KeePass in both Windows and Android

    You keep your passwords safely stored in KeePass on your Windows PC. Here's how to access them in Android, as well.
    By Lincoln Spector 11 years ago
    How-To

    How to keep your PC secure when Microsoft ends Windows XP support

    If you can't cut the Windows XP cord completely, here's how to keep your computer as safe as possible once security patches go buh-bye.
    By Chris Hoffman 11 years ago
    How-To

    How to use Google Chrome’s secret guest profile feature

    A new Chrome feature lets others use your browser without mucking up your bookmarks and settings.
    By Ian Paul 11 years ago
    Answer Line

    Can a hacker use a brute-force attack to steal an online password?

    Given enough time and computing power, a brute force attack can theoretically crack any password. But is that a real threat to Internet accounts?
    By Lincoln Spector 11 years ago
    How-To

    How to protect your PC in the web’s worst neighborhoods

    Shady download sites. Fake error warnings. Phishing, so much phishing. Avoid these dangers with a good security suite and an abundance of caution.
    By Alex Castle 11 years ago
    How-To

    How to find out if someone has been snooping in your Gmail

    A hidden feature in Gmail can tell you if someone's been rummaging through your love letters. Here's where to find it.
    By Nick Mediati 11 years ago
    How to keep your neighbors from hijacking your Wi-Fi
    Answer Line

    How to keep your neighbors from hijacking your Wi-Fi

    Your Internet connection could be slow for many reasons, but you can rule out local Wi-Fi thieves by employing strong passwords and a few other strategies.
    By Lincoln Spector 11 years ago
    Answer Line

    How to recover files after a malware attack

    Today’s malware can hold your precious files hostage and demand a ransom. Here’s how to get those files back.
    By Lincoln Spector 11 years ago
    How-To

    Declutter your PC for better security and more storage

    Unused applications can be vulnerable to security breaches. Clean them out before they cause trouble, and jettison older data files while you're at it.
    By Tony Bradley 11 years ago
    Answer Line

    Some password managers are safer than others

    Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"
    By Lincoln Spector 11 years ago
    How-To

    Keep your laptop safe and secure while you travel

    PCs make great travel companions, but you need to treat them right.
    By Alex Cocilova 11 years ago
    Bugs & Fixes

    Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer

    A fix stops Java from disabling itself, and iTunes for Windows and Internet Explorer get some security tweaks.
    By Jon L. Jacobi 11 years ago
    Answer Line

    Disable Windows’ logon password

    Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.
    By Lincoln Spector 11 years ago
    Answer Line

    What you need to know about privacy, email, and particularly Gmail

    Pritesh Singh asked if anyone other than the intended recipient can view files attached to a Gmail message.
    By Lincoln Spector 11 years ago
    Answer Line

    The mysterious ~$ files–nothing to worry about

    Lillian Lim noticed strange files appearing and disappearing. The file names always begin with ~$.
    By Lincoln Spector 11 years ago
    How-To

    Security to go: Three tips to keep your mobile data safe

    It’s not easy keeping your devices secure, and mobile devices like smartphones, tablets, and, of course, laptops are no exception. But you can do a few things to improve your mobile security. Here’s a look at three of them.
    By Ian Paul 11 years ago
    Hassle-Free PC

    How to set up two-factor authentication in Evernote

    Even freebie accounts can now benefit from this valuable security feature.
    By Rick Broida 11 years ago
    Answer Line

    Actually, you do need to share your passwords

    No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.
    By Lincoln Spector 11 years ago
    How-To

    5 Wi-Fi security myths you must abandon now

    Save yourself and your friends from these outdated or inaccurate security techniques, and learn the current best practices.
    By Eric Geier 11 years ago
    How-To

    Lockdown: How to secure your PC without going crazy

    Digital privacy is within your grasp with this practical beginner's guide to encryption.
    By Ian Paul 11 years ago
    Answer Line

    Understanding tech language: The difference between malware and a virus

    While cleaning up an infected PC, Flingwing asked the Antivirus & Security Software forum to explain the difference between malware and viruses
    By Lincoln Spector 11 years ago
    How-To

    PC security, NSA-style: 7 tips from the spymasters

    Some of the agency's countersurveillance tips are easy for anyone to implement.
    By Paul Mah 11 years ago
    How-To

    How to protect your PC against devious security traps

    From phishers to hackers to all sorts of attackers, here's what you need to know to stay safe on the Web.
    By Brad Chacos 11 years ago
    How-To

    How to clean and secure your browser like a pro

    Ads and toolbars are the scum and villainy of the browser world. Eliminate them quickly and make sure they never come back with these simple tips.
    By Eric Geier 11 years ago
    Hassle-Free PC

    Why I’m turning over password management to Dashlane

    This utility is so good, I'm even going to pay for the premium version.
    By Rick Broida 11 years ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 12 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Deals

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2024 IDG Communications, Inc.
    Top Of Page