• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    How to tell if your Android phone has spyware
    Updated

    How to tell if your Android phone has spyware

    You know that Google, your service provider, and Facebook follow what you do on your phone. But what about your employer, your spouse, or a criminal? Find out if you have spyware on your Android phone and what to do about it.
    By Lincoln Spector 9 years ago
    Answer Line

    When to choose a password, when to choose a PIN

    You understand that you need to protect your PC, phone, and online accounts. But do you always have to use a long and complex password?
    By Lincoln Spector 9 years ago
    Answer Line

    5 ways to stop spam from invading your email

    We're all sick of spam, whether it's Nigerian banking scams, pseudo-sexy invitations, or click-for-malware buttons. Here's how to get them out of your life.
    By Lincoln Spector 9 years ago
    Security Measures

    All about your ‘fullz’ and how hackers turn your personal data into dollars

    Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.
    By Robert Lemos 9 years ago
    Security Measures

    How to keep USB thumb drive malware away from your PC

    Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.
    By Robert Lemos 9 years ago
    How to change your passwords automatically with Dashlane and LastPass
    Hassle-Free PC

    How to change your passwords automatically with Dashlane and LastPass

    It's a pain to change your passwords manually. These two password managers make it easier by doing it for you.
    By Ian Paul 9 years ago
    Answer Line

    How to stop ransomware: Backup can protect you, but only if you do it right

    No one wants to give hundreds of dollars to extortionists. But if you take the right precautions beforehand, ransomware probably can't hurt you.
    By Lincoln Spector 9 years ago
    Security Measures

    What to ask your doctor, lawyer, and accountant about protecting your personal data

    Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security.
    By Robert Lemos 9 years ago
    Answer Line

    Windows 10 picture password: Draw your own conclusions about its safety

    Windows 10's picture password gives you an alternative to traditional passwords and PINs that could be easier to remember. Whether it's as safe is a good question–we go over the issues here.
    By Lincoln Spector 9 years ago
    Online privacy: 3 ways to ward off cyber criminals and snoops
    Security Measures

    Online privacy: 3 ways to ward off cyber criminals and snoops

    Keep yourself safe with these online security tips, from anonymous browsing to hiding your digital tracks.
    By Jonathan Keane 9 years ago
    Hassle-Free PC

    Pure URL simplifies web addresses for safer surfing

    The Pure URL extension for Chrome and Firefox makes web addresses that appear in your browser easier to read and less of a potential security risk.
    By Ian Paul 9 years ago
    Hassle-Free PC

    Why you need a cloud backup service, and how to use one

    Cloud backup is the easiest way to get the security of off-site backup for your important files. Here's how to choose and use one of these services.
    By Ian Paul 9 years ago
    Hassle-Free PC

    How to retrieve Wi-Fi passwords saved on your PC

    If your PC knows your Wi-Fi password, but you don't, these tips will help.
    By Ian Paul 9 years ago
    How to easily secure your web browsing with Hotspot Shield’s free, unlimited proxy
    Hassle-Free PC

    How to easily secure your web browsing with Hotspot Shield’s free, unlimited proxy

    VPN provider Hotspot Shield has add-ons for Firefox and Chrome to help keep your web browsing secure quickly and easily.
    By Ian Paul 9 years ago
    Security Measures

    Ransomware’s latest threats: What to do about CryptoWall, Chimera and their ilk

    In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.
    By Robert Lemos 9 years ago
    Answer Line

    Why Lenovo’s PCs have less bloatware or spyware than ever before

    Lenovo consumer PCs used to have a lot of bloatware, but the company cleaned up its act after getting burned on one bad program earlier this year.
    By Lincoln Spector 9 years ago
    Answer Line

    Sharing passwords: One way to save a lot of heartache in case of senility, accident, or death

    Arrange to give loved ones access to key online accounts. Don't worry, you won't lose control.
    By Lincoln Spector 9 years ago
    HTTPS errors: What to do when your PC freaks out
    Hassle-Free PC

    HTTPS errors: What to do when your PC freaks out

    Connection errors are annoying, but they usually require a simple fix.
    By Ian Paul 9 years ago
    How to encrypt and password-protect ZIP files the right way
    Answer Line

    How to encrypt and password-protect ZIP files the right way

    You can protect the contents of a ZIP file, but unless you know the trick, you might as well not bother.
    By Lincoln Spector 10 years ago
    The quick and easy way to find the best antivirus software
    Hassle-Free PC

    The quick and easy way to find the best antivirus software

    Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.
    By Ian Paul 10 years ago
    Answer Line

    Your mobile IP address: Its safety is one thing, its privacy is another

    Your mobile IP address isn't likely to be stolen. But you still need to take precautions.
    By Lincoln Spector 10 years ago
    Security Measures

    Trust no one: How caller ID spoofing has ruined the simple phone call

    Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
    By Robert Lemos 10 years ago
    Answer Line

    Cloud storage alternatives: Three ways to sync your own data securely and privately

    Cloud storage is convenient, but you can remove any concerns about security or other issues if you do what they do yourself.
    By Lincoln Spector 10 years ago
    Security Measures

    The 3-step plan to make your website harder to hack

    Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
    By Robert Lemos 10 years ago
    Security Measures

    NFC security: 3 ways to avoid being hacked

    More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
    By Robert Lemos 10 years ago
    Answer Line

    The dangers of Android malware may be exaggerated, but you should still play it safe

    Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.
    By Lincoln Spector 10 years ago
    Security Measures

    5 steps to keep your smart home from being hacked

    Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
    By Robert Lemos 10 years ago
    Five precautions for avoiding malware when you download and install software
    Answer Line

    Five precautions for avoiding malware when you download and install software

    Downloading a little-known program can be scary. Take these steps to protect yourself.
    By Lincoln Spector 10 years ago
    Security Measures

    How to prevent mobile malware in 3 easy steps

    Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
    By Robert Lemos 10 years ago
    Hassle-Free PC

    How to easily secure your web browsing with TunnelBear’s free Chrome extension

    Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.
    By Ian Paul 10 years ago
    Answer Line

    You can securely wipe your files, hard drive or SSD with one of these free utilities

    You delete a file, then empty the recycle bin. But the contents of that file remains on your drive. Here's what to do about that.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Sick of Netflix’s available shows? Use a VPN to change your country and see more

    There may be some risk, but if you're interested you can check out the Netflix movie selection in countries around the world.
    By Ian Paul 10 years ago
    How to download your entire Google search history
    How-To

    How to download your entire Google search history

    Want a copy of your personal Google search history for your very own? Now you can export and download it, though it's in a funky file format.
    By Ian Paul 10 years ago
    Answer Line

    What to do if someone steals your IP address

    Maybe there's weird activity on your home network. Maybe your ISP's asking about illegal online dealings. That's when you need to check your IP address.
    By Lincoln Spector 10 years ago
    Answer Line

    Prepare to take your laptop to another country

    Planning a trip overseas with your laptop? These precautions will help with smooth sailing.
    By Lincoln Spector 10 years ago
    Answer Line

    Recover a stolen laptop, or prepare for the day your laptop is stolen

    You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.
    By Lincoln Spector 10 years ago
    Updated

    How to remove the dangerous Superfish adware preinstalled on Lenovo PCs

    Lenovo has been preloading new consumer PCs with Superfish adware that injects ads and hijacks the secure HTTPS encryption of every site you visit. Eradicating the threat isn't easy, but here's how, complete with a new automated tool.
    By Brad Chacos 10 years ago
    Answer Line

    How to protect your wireless router from malware

    Your PC and your phone aren't the only devices that can catch an infection. The router that connects them to the Internet may also be vulnerable.
    By Lincoln Spector 10 years ago
    How-To

    How to automatically unlock your Chromebook when your Android phone’s nearby

    If you have an Android 5.0 Lollipop phone, Smart Lock eliminates the need to re-type your password every time you want to fire up your Chromebook.
    By Derek Walter 10 years ago
    Answer Line

    How to handle a Facebook bully or stalker

    Bad people stalk the social network. Here's what you need to do if someone continually gives you trouble.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    VPNs made easy: 3 services with one-click desktop apps

    Choosing the right VPN for you is hard enough. Why make it harder by having to muck about with network settings?
    By Ian Paul 10 years ago
    Hassle-Free PC

    4 easy ways to cut your software costs in 2015

    Are you paying money for software when perfectly good free alternatives exist? Here are four areas to consider dumping your annual software payments with solid free alternatives.
    By Ian Paul 10 years ago
    Take precautions when using public Wi-Fi networks
    Answer Line

    Take precautions when using public Wi-Fi networks

    When you take your laptop to a library or café, you take a risk. But if you know what you're doing, you can minimize that risk.
    By Lincoln Spector 10 years ago
    Hassle-Free PC

    Three security-boosting steps to perform on every router

    If you haven't done this with your router yet, do so STAT to make sure it's nice and secure.
    By Ian Paul 10 years ago
    Answer Line

    Keep encrypted files encrypted when you back them up to the cloud

    You keep selected files or folders encrypted on your internal drive. But are they protected when you use an online backup service?
    By Lincoln Spector 10 years ago
    How-To

    Travel safely with your tech: How to prevent theft, loss and snooping on the road

    All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.
    By Chris Hoffman 10 years ago
    Answer Line

    Does your computer have malware? Here are the telltale signs

    Viruses, Trojans, and worms, oh, my! These symptoms are warning signs that you might have an infected PC.
    By Lincoln Spector 10 years ago
    How-To

    How to protect yourself from PC tech support scams

    In the third time since 2011, the U.S. Federal Trade Commission has shut down another operation selling bogus tech support to Windows PC owners.
    By Ian Paul 10 years ago
    Smart Mobile Tricks

    How to stop SMS spam on your Android or iOS phone

    SMS spam is proliferating fast, but your phone's settings or a handy app can help stem the tide.
    By Ben Patterson 10 years ago
    Answer Line

    BadUSB: What you can do about undetectable malware on a flash drive

    We've known for years that malware can spread via portable storage. But BadUSB shows that scanning the drive may not be sufficient.
    By Lincoln Spector 10 years ago
    Previous 1 2 3 4 5 6 7 8 9 10 … 13 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page