• News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
Skip to content
  • Menu
  • News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    Hassle-Free PC

    Recover a Stolen Laptop with Free LockItTight

    Laptops get stolen every day. If you want to increase the chances of recovering yours without paying a monthly service charge, this service can help.
    By Rick Broida 14 years ago
    How-To

    How to Set Google+ Privacy Settings

    For years, rumors have circulated that Facebook’s privacy blunders would cause a mass exodus, and some users say they feel safer using Google+. Elsa Wenzel shows you how to modify settings and keep your profile private.
    By PCWorld Video 14 years ago
    How-To

    Google+ Updates Privacy Tools for All Users

    Locking down a Google+ profile is available to any user of Google's social media field trial. Here's how to proceed.
    By Paul Suarez 14 years ago
    How-To

    Tips for a Malware-Free Android Smartphone

    With mobile malware on the rise, you can never be too careful with your device and your personal data.
    By Armando Rodriguez 14 years ago
    How-To

    What Your IT Pro Knows About You–and Can Do to Your Company

    Why worry about hackers half a world away? The biggest threat to your business may lurk within your walls, among the IT pros you trust most.
    By Paul Venezia 14 years ago
    How-To

    How to Stay Safe on Campus: 5 Easy Tips

    Keeping your PC and gear safe on campus isn't hard! Here are the steps you need to take in the dorm room, in the library, and in the classroom.
    By Nick Mediati 14 years ago
    Answer Line

    Did Facebook Give me a Virus?

    QueenPendragon received a very scary message from Facebook
    By Lincoln Spector 14 years ago
    How-To

    How to Use Strong Passwords

    Reduce your vulnerability to data theft and other hacker threats by creating and using robust passwords.
    By Nick Mediati 14 years ago
    How-To

    How to Avoid Trouble on Public Computers and Wi-Fi

    Reduce your exposure to malware and data theft by minimizing your use of public wireless networks and PCs.
    By Nick Mediati 14 years ago
    Tech Audit

    Protect Your Company With Web Filtering Tools

    For small businesses, a security overhaul usually starts with a firewall and antivirus software. In addition, enabling Web filtering can prevent both inbound and outbound security threats.
    By Elsa Wenzel 14 years ago
    How-To

    How to Use an HTTPS-Encrypted Connection When Browsing

    Maintain an encrypted pathway between your PC and the Websites you visit.
    By Nick Mediati 14 years ago
    How-To

    How to Lock Down Your Smartphone

    Prevent malware on your mobile devices by installing suitable antivirus and security apps.
    By Nick Mediati 14 years ago
    How-To

    Can You be Cyber-Stalked? The 30-Minute Google Challenge

    What traces do you leave on the Web? Two PCWorld editors try to dig up dirt on their coworkers in under 30 minutes.
    By Patrick Miller and Ginny Mies 14 years ago
    How-To

    How to Encrypt a Hard Drive

    Use encryption to prevent outsiders from gaining easy access to data on your hard drives and flash drives.
    By Nick Mediati 14 years ago
    How-To

    How to Secure Your Home Wi-Fi Network

    Protect your wireless network against intrusion.
    By Nick Mediati 14 years ago
    How-To

    How to Use Virtual Credit Card Numbers to Shop Online

    Increase your online security by creating a protective wrapper for your credit card information.
    By Nick Mediati 14 years ago
    Hassle-Free PC

    Avoid Getting Scammed by Fake Tech-Support Calls

    "Hello, customer? Microsoft here. We've detected rogue software on your PC. But don't worry, we can fix it. Just need your credit card number."
    By Rick Broida 14 years ago
    How-To

    Four Safer Ways to Pay Online

    Worried about hackers snagging your credit card info? Taking a few precautionary steps can go a long way in protecting your account.
    By Jeff Bertolucci 14 years ago
    How-To

    How to Install an SSD in Your Laptop

    Laptops are ideal candidates for solid state drives: These drives are more rugged and shock resistant than standard hard drives, since they have no moving parts.
    By PCWorld Video 14 years ago
    Security Alert

    Are You a Data Breach Victim? Here’s What to Do

    Sony Pictures suffered a massive data breach that may impact up to 1 million users, but data breaches are fairly common. Here's a checklist of what to do–and what to watch for–if you fall victim.
    By Nick Mediati 14 years ago
    How-To

    How To Get Online Anywhere

    Stay connected while you're traveling and on-the-go.
    By Yardena Arar 14 years ago
    Simply Business

    Boost Your Productivity By Blocking Distracting Sites

    Add-ons designed as parental controls can also stop the kid in you from wasting time online.
    By Robert Strohmeyer 14 years ago
    Answer Line

    What Do You Do With an Infected CD, DVD, or Flash Drive?

    Cyberknight asked the Antivirus & Security Software forum about safely handling infected external media
    By Lincoln Spector 14 years ago
    Answer Line

    Protect Your Kids Online

    Tru006 asked the Web Browsing and Email forum for suggestions on monitoring and controlling children's browsing habits
    By Lincoln Spector 14 years ago
    How-To

    Protect Your Data From the Breach Epidemic

    Sony's PSN data breach got all the headlines, but this sort of attack is hardly rare. Here's what should you know about such breaches, and how to protect your data.
    By Tony Bradley 14 years ago
    How-To

    Do You Know What Your Kids Are Doing Online? These Tools Can Help

    There's a fine line between giving kids independence and being oblivious to what they're up to. Here's how to find that balance and keep your children from getting into trouble online, without unduly encroaching on their individual privacy.
    By Tony Bradley 14 years ago
    Answer Line

    Remove Windows Defender (As Long As Windows is Defended)

    Windows Defender isn't listed in Control Panel's uninstallers. Spiritchaser asked the Answer Line forum how to remove it.
    By Lincoln Spector 14 years ago
    How-To

    11 Free Microsoft Tools You’re Overlooking

    Microsoft Windows and Internet Explorer are virtually synonymous with personal computing, but there are also many free tools from Microsoft that you may not be aware of.
    By Tony Bradley 14 years ago
    Answer Line

    Edit Your Browser’s AutoFill or AutoComplete–and Protect Your Credit Cards

    Tom Guthrie wants to selectively remove the usernames, passwords, and other bits of text from his browser's AutoFill feature
    By Lincoln Spector 14 years ago
    How-To

    Secure Your Life in 12 Steps

    Lock down your computer, your home network, your identity–even your phone.
    By Nick Mediati 14 years ago
    Answer Line

    Too Many Antivirus Programs?

    Keith has Norton AntiVirus, Malwarebytes' Anti-Malware, SUPERAntiSpyware, Windows Defender, and Windows Firewall. Is this overkill?
    By Lincoln Spector 14 years ago
    How-To

    How to Reset Your Wireless Router

    Resetting your router can fix networking problems, and may be necessary for security reasons.
    By PCWorld Video 14 years ago
    Answer Line

    I Emailed a Credit Card Number

    Robert emailed credit card information to a business. Should he cancel the credit card?
    By Lincoln Spector 14 years ago
    How-To

    Leaving Your Job? Take Your Data With You

    Whether you're leaving on your own timetable or departing with a pink slip in your hand, here's how to hit the bricks with your digital life intact.
    By Robert Strohmeyer 14 years ago
    How-To

    Protect Your Online Privacy (Without Reading All the Fine Print)

    Before signing up for a new social network service or downloading that new application on your phone, read these privacy suggestions first.
    By Robert Vamosi 14 years ago
    Answer Line

    Do I Have a Freeloader on My WiFi?

    Chris Beck wants to find out if there are unauthorized users on his wireless network.
    By Lincoln Spector 14 years ago
    How-To

    Get Started With a VPN: For Beginners, Power Users, and IT Pros

    How to Choose and Use a VPN, For Beginners and Experts Get Started With a VPN at Any Level
    By Steven Vaughan-Nichols 14 years ago
    How-To

    Stop Your Boss From Spying on You

    Tired of having a corporate Big Brother looking over your shoulder? Here are a few easy ways to keep your employer from monitoring your online life.
    By Robert Strohmeyer 14 years ago
    How-To

    How to Monitor Your Employees’ PCs Without Going Too Far

    How to Monitor Your Employees' PCs Without Going Too Far
    By Robert Strohmeyer 14 years ago
    How-To

    How to Mine Customer Data the Right Way

    Data mining can help you unearth hidden information about what your customers want–but you should avoid becoming a pariah or being singled out by the media for privacy violations. Here are the right methods to build a loyal customer following.
    By Robert Vamosi 14 years ago
    Answer Line

    Is VOIP Secure?

    USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol phone calls
    By Lincoln Spector 14 years ago
    BizFeed

    Prevent E-mail Disasters: 5 Tools to Protect You from Slip-ups

    A growing number of tech tools are now on hand to prevent the all-too-common e-mail faux pas.
    By Katherine Noyes 14 years ago
    Answer Line

    Is It Malware?

    Amark found OpenCandy on a PC, and asked the Utilities forum if it's malicious
    By Lincoln Spector 14 years ago
    Hassle-Free PC

    How to Avoid Getting Burned by ‘Sneakware’

    When you install Adobe Reader X, it tries to sneak a McAfee security scanner onto your system. A keen eye can help prevent this kind of thing.
    By Rick Broida 14 years ago
    How-To

    Firefox Tips, Plus a Warning: Protect Those Passwords

    Follow these tips to make scrolling in Mozilla Firefox much smoother, plus a public service announcement: don't take password security lightly.
    By Rick Broida 14 years ago
    How-To

    Security on a Shoestring Budget

    With the right mix of open-source tools, protecting your PCs and your network doesn’t have to break your bottom line.
    By Tony Bradley 14 years ago
    Hassle-Free PC

    The Wrong Way to Manage Your Passwords

    If you're storing your passwords in a Word document, Excel spreadsheet, or the like, you might as well just hand them over to hackers right now.
    By Rick Broida 14 years ago
    Answer Line

    More on Gaining Administrator Access Without a Password

    Locked out of your PC's administrator account? I revisit an old question with a new answer.
    By Lincoln Spector 14 years ago
    Tech Audit

    When Nobody Is Watching Your Business, Security Systems Can

    Keep an eye on your business with IP cameras.
    By Elsa Wenzel 14 years ago
    How-To

    9 Ways to Keep Your Mobile Devices Secure While Traveling

    What’s secure and what’s not, and how to make sure your devices don’t get hacked the next time you step out of the house.
    By Logan Kugler 14 years ago
    Previous 1 … 3 4 5 6 7 8 9 10 11 12 13 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
    • Policies
      • Privacy Policy
      • Cookie Policy
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
    • About
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
    • PCWorld Categories
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

    • Subscribe
      • Recent cover images of Macworld Digital Magazine
      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    Copyright © 2025 IDG Communications, Inc.
    Top Of Page