• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    How-To

    Lock and encode your flash drives with BitLocker to Go encryption in Windows 8

    How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.
    By Marco Chiappetta 12 years ago
    Answer Line

    Why isn’t a program malware if it installs additional, unwanted software?

    The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?
    By Lincoln Spector 12 years ago
    Hassle-Free PC

    How to bypass the Windows 8 password screen

    Tired of entering your password every time you boot your PC? Here's how to turn that option off.
    By Rick Broida 12 years ago
    How-To

    Beyond antivirus software: Eclectic PC security tools for system-wide audits

    Are you doing everything necessary to keep your PC safe? These utilities can fill in the gaps left by traditional antivirus software.
    By Eric Geier 12 years ago
    Answer Line

    The Malicious Safety OneCare Essential Defender: Straightening out Microsoft’s confusing security tools

    Microsoft has released a confusing selection of security programs over the years. Deborah Armstrong asked me to make sense of them.
    By Lincoln Spector 12 years ago
    How-To

    How (and why) to surf the web in secret

    We give you essential tips and tools for hiding your IP address and surfing the Web in blissful anonymity.
    By Brad Chacos 12 years ago
    How-To

    PC security: Your essential software toolbox

    Don't fall victim! With these tools, services and tips, you can protect yourself against malware, phishing and theft.
    By Eric Geier 12 years ago
    Answer Line

    Gain access to your PC without the logon password

    2godballdaglory asked the Answer Line how he can boot an old PC with a password he no longer remembers.
    By Lincoln Spector 12 years ago
    Hassle-Free PC

    Peek behind abbreviated Web links with Unshorten.it

    Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe.
    By Rick Broida 12 years ago
    How-To

    Prepare your business for digital disaster

    Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think.
    By Christopher Null 12 years ago
    Hassle-Free PC

    How to avoid fake Download buttons

    It's all too easy to click the wrong button or link on an otherwise legitimate download page. Here are three ways to protect yourself.
    By Rick Broida 12 years ago
    Answer Line

    Learn to use strong passwords

    Passwords protect every part of your online life. If you don't treat them properly, you're exposing yourself to a whole mess of trouble.
    By Lincoln Spector 12 years ago
    Answer Line

    Can I recover a stolen laptop?

    Justin Yuen asked if it's possible to recover a stolen laptop.
    By Lincoln Spector 12 years ago
    How-To

    How to encrypt your cloud storage for free

    BoxCryptor is a freemium, easy-to-use encryption program that can help you keep your data private in the cloud.
    By Brad Chacos 13 years ago
    Answer Line

    Safely send private information over the Internet

    KenWid10 asked the Antivirus & Security Software forum how best to send encrypted information to someone over the Internet
    By Lincoln Spector 13 years ago
    How-To

    How to find happiness in a world of password madness

    In the grand scheme of digital security, passwords have become self-defeating, often impotent tools. We need too many of them, and the strong ones are too hard to remember. Luckily, however, you can improve today's passwords with proper management, and tomorrow's security tech may eliminate passwords completely.
    By Dan Tynan 13 years ago
    Answer Line

    Does the Windows logon password protect your data?

    After discovering how easy it is to recover data from a hard drive removed from one PC and attached to another, Melker asked the Hard Drives, NAS Drives, Storage forum if password protecting Windows actually protects your data.
    By Lincoln Spector 13 years ago
    Answer Line

    Is Your ISP Spying On You?

    Arcticsid asked the Answer Line forum if his ISP can "sit back…watch a screen, and see everything you are doing at any given time?"
    By Lincoln Spector 13 years ago
    Answer Line

    When Your PC is Likely Infected

    Joyce V's computer is having trouble with security programs–a strong indication that her computer may be infected with malware
    By Lincoln Spector 13 years ago
    How-To

    Easy Home Automation Projects for the Weekend Warrior: Part One

    This first installment in an ongoing series will cover everything you need to know about lighting control.
    By Michael Brown 13 years ago
    Answer Line

    My Twitter Account Has Been Hacked!

    GoGators complained to the Answer Line forum about his hacked Twitter account.
    By Lincoln Spector 13 years ago
    Answer Line

    My Email Account Has Been Hijacked!

    Coastie65 is nowhere near Malaysia, but friends are getting email claiming that he's stranded in Kuala Lumpur. He asked the Web Browsing and Email forum for help.
    By Lincoln Spector 13 years ago
    How-To

    Tablet Encryption 101

    Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.
    By Jason Kennedy 13 years ago
    Answer Line

    Password Protect a Flash Drive

    Enddylopez asked the Hard Drives, NAS Drives, Storage forum about password protecting a flash drive
    By Lincoln Spector 13 years ago
    How-To

    How to Keep Your Employees Happy With Their Company PCs (Without Losing Control of Your IT)

    Your staff will be more content if they can install their choice of software. Here’s how to give them that freedom while keeping control over your IT environment.
    By David Murphy 13 years ago
    How-To

    How to Protect Your Artistic Works With a Creative Commons License

    These alternative licenses improve on existing copyright law by enabling content owners to promote the sharing and dissemination of their works.
    By Katherine Noyes 13 years ago
    How-To

    Protect Yourself From DNSChanger

    If the DNSChanger rootkit has infected your PC, you'll lose access to the Internet when the FBI shuts down DNSChanger's surrogate DNS servers. Here's how to determine whether you're infected, and what to do if you are.
    By Alex Wawro 13 years ago
    Answer Line

    Recover Encrypted Files From An Old Hard Drive

    Jeff Hudgins removed the hard drive from a dying computer, and via USB plugged it into a new PC. But he can't access his files. They're encrypted.
    By Lincoln Spector 13 years ago
    How-To

    The Greatest PC Mysteries–Solved!

    PCWorld's editors band together to solve the greatest PC mysteries! Find out why your PC beeps on startup, what a .dat file is, how USB 2.0 and USB 3.0 differ, and much more!
    By PCWorld Staff 13 years ago
    How-To

    How to Encrypt Your Email

    Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
    By Eric Geier 13 years ago
    How-To

    Free Tools to Wipe Your Drives Securely

    Properly clear off old data from a flash drive, hard-disk drive, solid-state drive, or hybrid hard drive–at no cost.
    By Alex Wawro 13 years ago
    How-To

    Minimize Your Exposure to Email Spoofing

    Did someone really hijack your email address to mass-mail spam messages? Not necessarily. Here's what might have happened.
    By Tony Bradley 13 years ago
    Hassle-Free PC

    Avoid Fake Online Stores with Zscaler Safe Shopping Plug-in

    Now available for all browsers, this handy tool alerts you when you visit a bogus or compromised e-commerce site.
    By Rick Broida 13 years ago
    Answer Line

    Can I Safely Open Suspected Spam?

    C. Corder asked if it's safe to open an email that landed in the spam folder
    By Lincoln Spector 13 years ago
    Answer Line

    International Travel and Your Laptop

    Your laptop could be stolen at the airport, in your hotel, or when you're walking down a street. A few precautions should provide protection.
    By Lincoln Spector 13 years ago
    How-To

    Malicious Web Apps: How to Spot Them, How to Beat Them

    These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.
    By Tony Bradley 13 years ago
    Hassle-Free PC

    Create a Different, Secure, Easy-to-Remember Password for Every Site

    Need an easy way to generate and manage your passwords? Here's a simple trick that requires no special software.
    By Rick Broida 13 years ago
    How-To

    Secure Your Home or Office Wi-Fi

    Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.
    By Eric Geier 13 years ago
    How-To

    How to Protect Your Laptop

    Follow our guide to safeguard your laptop, as well as the data that resides on it.
    By Sarah Jacobsson Purewal 13 years ago
    How-To

    How to Become an Ethical Hacker

    Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.
    By Eric Geier 13 years ago
    How to block websites
    How-To

    How to block websites

    Blocking all users of a Windows PC from opening certain websites—no matter what browser they use or what time of day they are online—is easy if you follow this guide to tweaking your browser and router.
    By Justin Phelps 13 years ago
    Answer Line

    How Do I See Who’s Been Using My PC?

    AzharIqbal asked the Other Hardware forum how to see who else is using his computer.
    By Lincoln Spector 13 years ago
    BizFeed

    When ‘Viagra’ Comments on Your Blog, and Other Spam Red Flags

    Is a spammer just trying to use your site to boost their own web presence? Here's how to recognize a comment on your blog or website as spam, and how to stem the flow.
    By Angela West 13 years ago
    How to tell if a link is safe without clicking on it
    How-To

    How to tell if a link is safe without clicking on it

    Here's what to do with a link that looks suspicious.
    By Justin Phelps 13 years ago
    How-To

    Was Your Email Account Hacked? PwnedList Can Tell You

    Concerned about your private data in the wake of a big hack? The PwnedList website helps you find out if your online accounts were leaked during a data breach.
    By Alex Wawro 13 years ago
    Hassle-Free PC

    Root Out Rootkits with Free TDSSKiller

    Can't quite clean the malware from your PC? You might be the victim of a rootkit. Kaspersky's free utility should help.
    By Rick Broida 13 years ago
    How-To

    What Is Deep Packet Inspection?

    Though shelved for now, if legislation like SOPA and the PROTECT IP Act ever passes, it may require your ISP to start monitoring your online activity with deep packet inspection software. Make sure you understand how it works, and how you can fight back.
    By Alex Wawro 13 years ago
    BizFeed

    Five Ways to Mix Business and Personal Data on Your Smartphone

    Many people use their personal smartphones to do work. Here are five ways to access your work and personal data without carrying two handsets.
    By Joseph Fieber 13 years ago
    Security Alert

    Five Ways to Protect Your Email at Work

    Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.
    By Joseph Fieber 13 years ago
    Hassle-Free PC

    Restore Missing/Hidden Icons Wiped Out by a Virus

    Did an infection seemingly wipe out all your icons, programs, and data? Fear not: They might just be hidden. Here's how to restore them.
    By Rick Broida 13 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 … 13 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page