• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    How-To

    Keep Malware Off Your Android Phone: 5 Quick Tips

    As the list of infected Android apps grows, here is our advice on how to protect your Android smartphone from malware.
    By Armando Rodriguez 14 years ago
    BizFeed

    How to Browse Privately on Public Wi-Fi for Free

    With a handful of free software tools, you can fight off snoopers when using public Wi-Fi. Here's how, step by step.
    By Keir Thomas 14 years ago
    How-To

    Free Internet Security Tools, Lightweight PDF Reader

    Protect yourself for free with Flagfox for Firefox and BufferZone Pro; try the streamlined Sumatra PDF for basic needs.
    By Rick Broida 14 years ago
    How-To

    Repair Your Windows PC With System Restore

    The System Restore feature in Windows 7 lets you troubleshoot and repair your system by traveling back to a time before the problem began.
    By Tony Bradley 14 years ago
    How-To

    Must-Have Tools and Tricks

    Learn how to get a disposable e-mail address, stop Windows 7 from automatically resizing windows, and recover data from a dead laptop.
    By Rick Broida 14 years ago
    Hassle-Free PC

    Safe Browsing: Flagfox Shows the Location of the Site You’re Visiting

    This clever Firefox plug-in shows shows you what country is hosting the page you're viewing–useful for ferreting out phishing sites. It's loaded with other handy tools as well.
    By Rick Broida 14 years ago
    How-To

    How to Run an Online Background Check for Free

    Find out what you need to know about someone–or find out the information that's out there about you–without spending any money.
    By Sarah Jacobsson Purewal 14 years ago
    How-To

    15 Common Small-Business Tech Mistakes (and How to Avoid Them)

    15 Common Tech Mistakes Small-Businesses Make (and How to Avoid Them)
    By Sarah Jacobsson Purewal 14 years ago
    BizFeed

    Get a Dial-Up Connection When Disaster Strikes

    Whether a natural disaster or something more nefarious causes you to lose an Internet connection, dial-up can offer online access when all else fails.
    By Bruce Gain 14 years ago
    How-To

    Get Internet Access When Your Government Shuts It Down

    Does your government have an Internet kill-switch? Read our guide to Guerrilla Networking and be prepared for when the lines get cut.
    By Patrick Miller and David Daw 14 years ago
    How-To

    The 21 Greatest PC Mysteries–Solved!

    Find out why your documents won’t print, where your downloads disappear to, what a .dat file is, how those infernal toolbars invaded your browser, and much more.
    By Rick Broida 14 years ago
    How-To

    How to Tell Whether a Website Is Safe

    A free browser plug-in will help you avoid sites that might threaten your PC.
    By Rick Broida 14 years ago
    How-To

    Is It Really Necessary to Update Windows?

    Patches for Windows seem to arrive in a constant, annoying stream, but avoiding them is a bad idea.
    By Rick Broida 14 years ago
    How-To

    Why Do Adobe Reader and Java Update So Often?

    The frequent patches for Reader and Java may seem like a hassle, but installing them is important.
    By Rick Broida 14 years ago
    How-To

    How to Avoid Unwanted Browser Toolbars

    If you're not careful, your browser might become cluttered with toolbars–both benign and malicious.
    By Rick Broida 14 years ago
    How-To

    How to Completely Erase a Hard Drive

    These tips and tricks will help you destroy old data and make sure that your old drives are wiped clean.
    By PC World Video 14 years ago
    How-To

    Smartphone Security: How to Keep Your Handset Safe

    As smartphones grow more powerful than the PCs we used just a decade ago, they increasingly become the target of scam artists. Here's how to beef up security for your iOS, Android, BlackBerry, or Windows handset.
    By Brent Rose 14 years ago
    How-To

    How to Clean Up Your Online Reputation

    Taking control of how you appear in search results and on social networking sites may seem daunting, but it doesn't have to be difficult.
    By Sarah Jacobsson Purewal 14 years ago
    Security Alert

    Search Ruling Makes Smartphone Security More Crucial

    The California Supreme Court says cell phone data can be searched without a warrant, providing a powerful reminder to businesses to take data security seriously. Here are first steps.
    By Keir Thomas 14 years ago
    How-To

    New Year’s Tech Resolutions for Small Businesses

    Technology isn’t going to stop moving forward. It’s time to take stock of where your company’s tech is taking you–and of how to prepare for tomorrow.
    By Christopher Null 14 years ago
    Answer Line

    Could Malware Render Your PC Unbootable?

    A lot of people see a PC that won’t boot, and assume that it’s infected. That’s the least likely cause.
    By Lincoln Spector 14 years ago
    How-To

    Tech Support Showdown: Battle of the Big-Box Chains

    When seeking tech support for your small business, could your best option be the nearest outlet of a chain retailer? Here's how tech help from big brands compares with that of independent IT shops.
    By Tony Bradley 14 years ago
    Answer Line

    Protect Your Laptop

    Laptops can be stolen. Neoflyer asked the Answer Line forum for tips on protecting them.
    By Lincoln Spector 14 years ago
    Tech Audit

    Thin Clients Fit the Bill When PCs Are Overkill

    Ultraslim terminals can reduce the costs and work involved in managing desktop systems.
    By Elsa Wenzel 14 years ago
    BizFeed

    What Google’s Search Change Means For Your Website

    Now that Google tweaked its search algorithm to downgrade sites like DecorMyEyes that have bad reputations, small businesses should re-examine their search engine optimization strategies.
    By Katherine Noyes 14 years ago
    How-To

    Process Credit Cards Anywhere: 5 Smartphone Alternatives

    These 5 services let you accept credit card payments with a smartphone.
    By Zack Stern 14 years ago
    How-To

    Top Secret! Keep Your E-Mail Private and Secure

    E-mail is one of the most common methods of communication today–but if you aren’t careful, those digital messages may be intercepted or exposed.
    By Tony Bradley 14 years ago
    Answer Line

    Bank Online Safely

    NB asked me about precautions for banking online
    By Lincoln Spector 14 years ago
    How-To

    How to Tell If the Windows Firewall Is On

    Take a few minutes to confirm that this Windows security feature is active.
    By Sarah Peel 14 years ago
    How-To

    The Paranoid’s Guide to Facebook

    Facebook can be a scary place: It knows who your friends are, what you like, where you live, what you buy, and possibly even where you are right now. Here are 6 tips to help secure your personal information.
    By Logan Kugler 14 years ago
    How-To

    How to Avoid Malware

    Malware is easier to avoid than it is to remove. Avoiding malware involves a two-part strategy. Follow these guidelines for staying safe.
    By Justin Phelps 14 years ago
    How-To

    How to Tell If a File Is Infected Before You Open It

    It takes less time to check a suspicious file than it does to clean up the contamination it can cause. This guide shows you the steps to take to protect yourself.
    By Justin Phelps 14 years ago
    How-To

    Secure Your PC and Website From Firesheep Session Hijacking

    With the Firesheep plug-in, anyone on an open Wi-Fi network can hijack your session and access your accounts on Facebook, Gmail, and elsewhere. Here's how to keep your accounts safe and your business Website hijack-free.
    By Steven Andrés 14 years ago
    How-To

    How to Choose Network-Attached Storage for Your Business

    Network-attached storage can simplify your business's data management requirements. Here's what to look for when buying a NAS system.
    By Jon L. Jacobi 14 years ago
    How-To

    15 Awesome Things You Probably Shouldn’t Do

    Want to unlock your iPhone, download YouTube videos, or hack a stranger's Facebook account? It's all possible, but it's also all against the rules.
    By Dan Tynan 14 years ago
    How-To

    Lock Down Your Android Devices

    Learn how to protect the Android phones on your business network–and how to protect your business network from your Android phones.
    By Tony Bradley 14 years ago
    Tech Audit

    IT Certifications That Matter

    Here’s a quick guide to the meaning of various popular IT certifications and to the hoops they require IT pros to jump through.
    By Elsa Wenzel 14 years ago
    How-To

    Optimize Your PC, Security Apps 101, Find Folders Fast

    CCleaner got a must-have update; a reader wants to know if two security apps are better than one; Windows 7's Recent Places feature can save you time.
    By Rick Broida 14 years ago
    How-To

    How Do I Configure Windows Firewall in Windows Vista or Windows 7?

    Learn the basics of Windows Firewall and find out how to adjust it to meet your security needs.
    By Justin Phelps 14 years ago
    How-To

    The 25 Worst High-Tech Habits (and How to Fix Them)

    You’re doing a lot of stuff that's messing up your tech hardware–and your personal and professional life along with it. Here’s how to do better.
    By Christopher Null 14 years ago
    How-To

    How Do I Calibrate My Samsung HDTV?

    Your home lighting environment may require different settings than the automatic picture settings that are often designed for in-store display.
    By Patrick Nelson 14 years ago
    Linux Line

    How to Fix a Windows Infection Using Linux

    Even if you haven’t opted to run Linux on your computers, you can still use it to save malware-infected Windows machines.
    By Katherine Noyes 14 years ago
    Hassle-Free PC

    Flash Drive 101: Protecting Your Drive from Viruses

    Flash drives are carriers! Before you bring home something that could seriously infect your PC(s), clean your drive with a free and effective utility.
    By Rick Broida 14 years ago
    Answer Line

    Gain Administrator Access Without a Password

    Alexleonardme acquired a used PC but doesn't have the administrator password.
    By Lincoln Spector 14 years ago
    Tech Audit

    Choose the Right Tech Support for Your Business

    Who do you call when hardware and software take a turn for the worse? Here's how to seek IT help when your cousin's cousin can no longer handle the job.
    By Elsa Wenzel 15 years ago
    Am I Mailing Spam?
    Answer Line

    Am I Mailing Spam?

    Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her
    By Lincoln Spector 15 years ago
    The 17 Most Dangerous Places on the Web
    How-To

    The 17 Most Dangerous Places on the Web

    The scariest sites on the Net? They're not the ones you might suspect. Here's what to watch for and how to stay safe.
    By Nick Mediati 15 years ago
    Answer Line

    Should I Turn Off My Router?

    Keith Stanley asked if turning off his router will protect his computer from malware
    By Lincoln Spector 15 years ago
    How-To

    What Your Digital Photos Reveal About You

    The geotagging data contained in many mobile phone images lets strangers know exactly where you are.
    By Robert Vamosi 15 years ago
    Answer Line

    Very Slow PC

    Every now and then, Odoc’s PC slows down to a crawl. He asked the Answer Line forum for advice.
    By Lincoln Spector 15 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 12 13 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page