Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Updated
How to tell if your Android phone has spyware
You know that Google, your service provider, and Facebook follow what you do on your phone. But what about your employer, your spouse, or a criminal? Find out if you have spyware on your Android phone and what to do about it.Answer Line
When to choose a password, when to choose a PIN
You understand that you need to protect your PC, phone, and online accounts. But do you always have to use a long and complex password?Answer Line
5 ways to stop spam from invading your email
We're all sick of spam, whether it's Nigerian banking scams, pseudo-sexy invitations, or click-for-malware buttons. Here's how to get them out of your life.Security Measures
All about your ‘fullz’ and how hackers turn your personal data into dollars
Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.Security Measures
How to keep USB thumb drive malware away from your PC
Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.Hassle-Free PC
How to change your passwords automatically with Dashlane and LastPass
It's a pain to change your passwords manually. These two password managers make it easier by doing it for you.Answer Line
How to stop ransomware: Backup can protect you, but only if you do it right
No one wants to give hundreds of dollars to extortionists. But if you take the right precautions beforehand, ransomware probably can't hurt you.Security Measures
What to ask your doctor, lawyer, and accountant about protecting your personal data
Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security.Answer Line
Windows 10 picture password: Draw your own conclusions about its safety
Windows 10's picture password gives you an alternative to traditional passwords and PINs that could be easier to remember. Whether it's as safe is a good question–we go over the issues here.Security Measures
Online privacy: 3 ways to ward off cyber criminals and snoops
Keep yourself safe with these online security tips, from anonymous browsing to hiding your digital tracks.Hassle-Free PC
Pure URL simplifies web addresses for safer surfing
The Pure URL extension for Chrome and Firefox makes web addresses that appear in your browser easier to read and less of a potential security risk.Hassle-Free PC
Why you need a cloud backup service, and how to use one
Cloud backup is the easiest way to get the security of off-site backup for your important files. Here's how to choose and use one of these services.Hassle-Free PC
How to retrieve Wi-Fi passwords saved on your PC
If your PC knows your Wi-Fi password, but you don't, these tips will help.Hassle-Free PC
How to easily secure your web browsing with Hotspot Shield’s free, unlimited proxy
VPN provider Hotspot Shield has add-ons for Firefox and Chrome to help keep your web browsing secure quickly and easily.Security Measures
Ransomware’s latest threats: What to do about CryptoWall, Chimera and their ilk
In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.Answer Line
Why Lenovo’s PCs have less bloatware or spyware than ever before
Lenovo consumer PCs used to have a lot of bloatware, but the company cleaned up its act after getting burned on one bad program earlier this year.Answer Line
Sharing passwords: One way to save a lot of heartache in case of senility, accident, or death
Arrange to give loved ones access to key online accounts. Don't worry, you won't lose control.Hassle-Free PC
HTTPS errors: What to do when your PC freaks out
Connection errors are annoying, but they usually require a simple fix.Answer Line
How to encrypt and password-protect ZIP files the right way
You can protect the contents of a ZIP file, but unless you know the trick, you might as well not bother.Hassle-Free PC
The quick and easy way to find the best antivirus software
Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.Answer Line
Your mobile IP address: Its safety is one thing, its privacy is another
Your mobile IP address isn't likely to be stolen. But you still need to take precautions.Security Measures
Trust no one: How caller ID spoofing has ruined the simple phone call
Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.Answer Line
Cloud storage alternatives: Three ways to sync your own data securely and privately
Cloud storage is convenient, but you can remove any concerns about security or other issues if you do what they do yourself.Security Measures
The 3-step plan to make your website harder to hack
Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.Security Measures
NFC security: 3 ways to avoid being hacked
More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.Answer Line
The dangers of Android malware may be exaggerated, but you should still play it safe
Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.Security Measures
5 steps to keep your smart home from being hacked
Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.Answer Line
Five precautions for avoiding malware when you download and install software
Downloading a little-known program can be scary. Take these steps to protect yourself.Security Measures
How to prevent mobile malware in 3 easy steps
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.Hassle-Free PC
How to easily secure your web browsing with TunnelBear’s free Chrome extension
Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.Answer Line
You can securely wipe your files, hard drive or SSD with one of these free utilities
You delete a file, then empty the recycle bin. But the contents of that file remains on your drive. Here's what to do about that.Hassle-Free PC
Sick of Netflix’s available shows? Use a VPN to change your country and see more
There may be some risk, but if you're interested you can check out the Netflix movie selection in countries around the world.How-To
How to download your entire Google search history
Want a copy of your personal Google search history for your very own? Now you can export and download it, though it's in a funky file format.Answer Line
What to do if someone steals your IP address
Maybe there's weird activity on your home network. Maybe your ISP's asking about illegal online dealings. That's when you need to check your IP address.Answer Line
Prepare to take your laptop to another country
Planning a trip overseas with your laptop? These precautions will help with smooth sailing.Answer Line
Recover a stolen laptop, or prepare for the day your laptop is stolen
You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.Updated
How to remove the dangerous Superfish adware preinstalled on Lenovo PCs
Lenovo has been preloading new consumer PCs with Superfish adware that injects ads and hijacks the secure HTTPS encryption of every site you visit. Eradicating the threat isn't easy, but here's how, complete with a new automated tool.Answer Line
How to protect your wireless router from malware
Your PC and your phone aren't the only devices that can catch an infection. The router that connects them to the Internet may also be vulnerable.How-To
How to automatically unlock your Chromebook when your Android phone’s nearby
If you have an Android 5.0 Lollipop phone, Smart Lock eliminates the need to re-type your password every time you want to fire up your Chromebook.Answer Line
How to handle a Facebook bully or stalker
Bad people stalk the social network. Here's what you need to do if someone continually gives you trouble.Hassle-Free PC
VPNs made easy: 3 services with one-click desktop apps
Choosing the right VPN for you is hard enough. Why make it harder by having to muck about with network settings?Hassle-Free PC
4 easy ways to cut your software costs in 2015
Are you paying money for software when perfectly good free alternatives exist? Here are four areas to consider dumping your annual software payments with solid free alternatives.Answer Line
Take precautions when using public Wi-Fi networks
When you take your laptop to a library or café, you take a risk. But if you know what you're doing, you can minimize that risk.Hassle-Free PC
Three security-boosting steps to perform on every router
If you haven't done this with your router yet, do so STAT to make sure it's nice and secure.Answer Line
Keep encrypted files encrypted when you back them up to the cloud
You keep selected files or folders encrypted on your internal drive. But are they protected when you use an online backup service?How-To
Travel safely with your tech: How to prevent theft, loss and snooping on the road
All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.Answer Line
Does your computer have malware? Here are the telltale signs
Viruses, Trojans, and worms, oh, my! These symptoms are warning signs that you might have an infected PC.How-To
How to protect yourself from PC tech support scams
In the third time since 2011, the U.S. Federal Trade Commission has shut down another operation selling bogus tech support to Windows PC owners.Smart Mobile Tricks
How to stop SMS spam on your Android or iOS phone
SMS spam is proliferating fast, but your phone's settings or a handy app can help stem the tide.Answer Line