Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Answer Line
How to encrypt sensitive data? Put it in an encrypted container
We all have files that we'd rather not share with hackers and thieves (and maybe even our spouses). Here's how to put them in a place where no one else can open them.Hassle-Free PC
Need help? Microsoft Stores offer free tech support, PC tune-ups, malware removal
If you've got a problem with your PC. The Microsoft Store may be able to fix it for you for free.How-To
Safe from Shellshock: How to protect your home computer from the Bash shell bug
The 'Shellshock' Bash shell bug is a big deal, but it's relatively easy to keep your home PC safe.Answer Line
The 6 essential Windows software programs for any PC
No matter what else you do on your PC, everyone needs basic programs that cover security, web browsing, and backup.Hassle-Free PC
Three warning signs that email is malicious
You can't always count on your spam filter to keep you safe. For those times, it pays to keep your scam sleuthing skills sharp.How-To
These 5 antivirus suites keep potentially unwanted programs (PUPs) from biting
Potentially unwanted programs (PUPs) pack a nasty bite if left unchecked. The antivirus suite you already have may be able to catch and muzzle them.How-To
How to keep your sexy selfies (and other sensitive files) safe in the cloud
Whether you're storing old tax returns or the occasional naughty photo, some files deserve some extra security. Here's how to keep them private.Answer Line
What happens when Microsoft ends Windows 7 mainstream support next year
Next January, Microsoft will end mainstream support for Windows 7. But relax. That won't be end of the popular operating system.Answer Line
One of the best password managers for your PC, devices, and the cloud
You need a password manager; it's as important as antivirus. KeePass can do the job on all of your devices.How-To
How to use OpenPGP to encrypt your email messages and files in the cloud
When online services lack privacy controls, you can roll your own using near military-grade encryption.Answer Line
How to use Gmail 2-step verification on multiple devices
You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices.Answer Line
Why spammers persist despite filters and well-informed users
Our email clients filter them out. We know all of their tricks. Yet the spam keeps coming. Here's why.Hassle-Free PC
How to securely overwrite deleted files with a built-in Windows tool
When you delete a file in Windows, you're just removing the pointer. The data is still there. Here's how to make sure that data is gone, baby, gone.Hassle-Free PC
These 3 Chrome extensions make encryption easier for everyone
Want to use encryption tools, but you find most too hard to use? Check out these Chrome-based tools aiming to take the difficulty out of protecting your data online.Hassle-Free PC
How to create an anonymous email account
It's not just dissidents looking for anoymous email, but everyday people who'd rather not reveal their true identity.Answer Line
Some files need encryption and some files don’t
Chances are you don't have to encrypt your entire hard drive. But you need to know what files to encrypt.Answer Line
Take precautions when using Gmail—or any other email service
Google's almost ubiquitous email client doesn't guarantee that your email will be private, or that your account won't be hacked. But the right precautions can give you reasonable protection.Hassle-Free PC
Five questions to answer before paying for a VPN
VPNs are great for privacy and jumping regional restrictions, but not all VPNs are created equal. Knowing some of the key differences can save you time and hassle.Answer Line
You’ve fallen for a scam! Now what?
We all make mistakes. Here's what you need to do after realizing that you have been had, and keep those mistakes from costing you.How-To
How to keep the XSS TweetDeck bug from posting on your behalf
The XSS Hole in TweetDeck is more than a nuisance. If you're a user of the popular Twitter client, here's how to protect yourself, step by step.How-To
Locked out? Get back into Windows 8 by resetting your password
A forgotten password is no need for panic. There are several ways to get back into your Windows 8 PC if you've locked yourself out.Answer Line
Can your ISP read what you send over Facebook?
Your Internet service provider knows an awful lot about you. But when you’re on Facebook, your ISP is the least of your privacy worries.Hassle-Free PC
Get two-factor authentication on the desktop with Authy
A new app lets you generate two-factor authentication codes on your desktop PC. Here's how it works.How-To
Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives
Hitting 'delete' is just the beginning. Depending on the type of storage and the sensitivity of the information, there are other things you need to do to make sure your deleted files are gone for good.Answer Line
When Tech Support calls you
Out of the blue, someone calls and tells you your computer is infected or has a problem. Maybe they claim to be from Microsoft. Here’s what you should do.Hassle-Free PC
It’s spring! Clean out your PC’s junk with these free programs
You're already cleaning up your house for the summer months, so why not extend that DIY attitude to your PC too?How-To
How to selectively delete browser history
Remove individual sites or pages from your history rather than all of it. We'll show you how in this video tip.Answer Line
Protect your privacy while you browse
Here’s how to give crooks, corporations, and governments the slip while you search the web.How-To
How to remotely log out of Gmail
If you've left Gmail logged in on another computer, there's a quick and easy fix.Answer Line
Why you don’t need to encrypt your backup
You should back up all of your data files and encrypt the sensitive ones that you don’t want other people to read. But that doesn’t mean you have to encrypt the backup.Answer Line
Watch out for photos containing malware
That adorable picture of a cute kitten may contain claws. Here's how photos on the Internet can infect your PC.Bugs & Fixes
Bugs & Fixes: Making Synology’s VPN private again
Synology updates its DiskStation Manager OS to solve a little problem with hardcoded passwords.Bugs & Fixes
Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air
Anything that makes Flash safer is good. In this case, a known exploit makes the update well worth your time.Bugs & Fixes
Bugs & Fixes: 18 vulnerabilities in IE, squashed
A seemingly quiet Patch Tuesday lumps a bucket of browser vulnerabilities into one, big item. Windows and Silverlight bugs are also squashed.Answer Line
Your IP address: Who can see it and what you can do about it
You need a visible IP address to surf the web, but you can manage some of that visibility to protect your privacy. Here's how.How-To
Bypassing content filters: How to see the web they don’t want you to see
Maybe it's your own digital content, geo-blocked overseas. Maybe it's something you're not supposed to see. These tools could get you to it, but proceed with caution.Answer Line
Use KeePass in both Windows and Android
You keep your passwords safely stored in KeePass on your Windows PC. Here's how to access them in Android, as well.How-To
How to keep your PC secure when Microsoft ends Windows XP support
If you can't cut the Windows XP cord completely, here's how to keep your computer as safe as possible once security patches go buh-bye.How-To
How to use Google Chrome’s secret guest profile feature
A new Chrome feature lets others use your browser without mucking up your bookmarks and settings.Answer Line
Can a hacker use a brute-force attack to steal an online password?
Given enough time and computing power, a brute force attack can theoretically crack any password. But is that a real threat to Internet accounts?How-To
How to protect your PC in the web’s worst neighborhoods
Shady download sites. Fake error warnings. Phishing, so much phishing. Avoid these dangers with a good security suite and an abundance of caution.How-To
How to find out if someone has been snooping in your Gmail
A hidden feature in Gmail can tell you if someone's been rummaging through your love letters. Here's where to find it.Answer Line
How to keep your neighbors from hijacking your Wi-Fi
Your Internet connection could be slow for many reasons, but you can rule out local Wi-Fi thieves by employing strong passwords and a few other strategies.Answer Line
How to recover files after a malware attack
Today’s malware can hold your precious files hostage and demand a ransom. Here’s how to get those files back.How-To
Declutter your PC for better security and more storage
Unused applications can be vulnerable to security breaches. Clean them out before they cause trouble, and jettison older data files while you're at it.Answer Line
Some password managers are safer than others
Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"How-To
Keep your laptop safe and secure while you travel
PCs make great travel companions, but you need to treat them right.Bugs & Fixes
Bugs and Fixes: updates to Windows iTunes, Java, and Internet Explorer
A fix stops Java from disabling itself, and iTunes for Windows and Internet Explorer get some security tweaks.Answer Line
Disable Windows’ logon password
Don doesn't need to keep other people off his PC. He asked me how he could skip the logon screen and boot directly into Windows without a password.Answer Line