Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
Hassle-Free PC
Recover a Stolen Laptop with Free LockItTight
Laptops get stolen every day. If you want to increase the chances of recovering yours without paying a monthly service charge, this service can help.How-To
How to Set Google+ Privacy Settings
For years, rumors have circulated that Facebook’s privacy blunders would cause a mass exodus, and some users say they feel safer using Google+. Elsa Wenzel shows you how to modify settings and keep your profile private.How-To
Google+ Updates Privacy Tools for All Users
Locking down a Google+ profile is available to any user of Google's social media field trial. Here's how to proceed.How-To
Tips for a Malware-Free Android Smartphone
With mobile malware on the rise, you can never be too careful with your device and your personal data.How-To
What Your IT Pro Knows About You–and Can Do to Your Company
Why worry about hackers half a world away? The biggest threat to your business may lurk within your walls, among the IT pros you trust most.How-To
How to Stay Safe on Campus: 5 Easy Tips
Keeping your PC and gear safe on campus isn't hard! Here are the steps you need to take in the dorm room, in the library, and in the classroom.How-To
How to Use Strong Passwords
Reduce your vulnerability to data theft and other hacker threats by creating and using robust passwords.How-To
How to Avoid Trouble on Public Computers and Wi-Fi
Reduce your exposure to malware and data theft by minimizing your use of public wireless networks and PCs.Tech Audit
Protect Your Company With Web Filtering Tools
For small businesses, a security overhaul usually starts with a firewall and antivirus software. In addition, enabling Web filtering can prevent both inbound and outbound security threats.How-To
How to Use an HTTPS-Encrypted Connection When Browsing
Maintain an encrypted pathway between your PC and the Websites you visit.How-To
How to Lock Down Your Smartphone
Prevent malware on your mobile devices by installing suitable antivirus and security apps.How-To
Can You be Cyber-Stalked? The 30-Minute Google Challenge
What traces do you leave on the Web? Two PCWorld editors try to dig up dirt on their coworkers in under 30 minutes.How-To
How to Encrypt a Hard Drive
Use encryption to prevent outsiders from gaining easy access to data on your hard drives and flash drives.How-To
How to Use Virtual Credit Card Numbers to Shop Online
Increase your online security by creating a protective wrapper for your credit card information.Hassle-Free PC
Avoid Getting Scammed by Fake Tech-Support Calls
"Hello, customer? Microsoft here. We've detected rogue software on your PC. But don't worry, we can fix it. Just need your credit card number."How-To
Four Safer Ways to Pay Online
Worried about hackers snagging your credit card info? Taking a few precautionary steps can go a long way in protecting your account.How-To
How to Install an SSD in Your Laptop
Laptops are ideal candidates for solid state drives: These drives are more rugged and shock resistant than standard hard drives, since they have no moving parts.Security Alert
Are You a Data Breach Victim? Here’s What to Do
Sony Pictures suffered a massive data breach that may impact up to 1 million users, but data breaches are fairly common. Here's a checklist of what to do–and what to watch for–if you fall victim.Simply Business
Boost Your Productivity By Blocking Distracting Sites
Add-ons designed as parental controls can also stop the kid in you from wasting time online.Answer Line
What Do You Do With an Infected CD, DVD, or Flash Drive?
Cyberknight asked the Antivirus & Security Software forum about safely handling infected external mediaAnswer Line
Protect Your Kids Online
Tru006 asked the Web Browsing and Email forum for suggestions on monitoring and controlling children's browsing habitsHow-To
Protect Your Data From the Breach Epidemic
Sony's PSN data breach got all the headlines, but this sort of attack is hardly rare. Here's what should you know about such breaches, and how to protect your data.How-To
Do You Know What Your Kids Are Doing Online? These Tools Can Help
There's a fine line between giving kids independence and being oblivious to what they're up to. Here's how to find that balance and keep your children from getting into trouble online, without unduly encroaching on their individual privacy.Answer Line
Remove Windows Defender (As Long As Windows is Defended)
Windows Defender isn't listed in Control Panel's uninstallers. Spiritchaser asked the Answer Line forum how to remove it.How-To
11 Free Microsoft Tools You’re Overlooking
Microsoft Windows and Internet Explorer are virtually synonymous with personal computing, but there are also many free tools from Microsoft that you may not be aware of.Answer Line
Edit Your Browser’s AutoFill or AutoComplete–and Protect Your Credit Cards
Tom Guthrie wants to selectively remove the usernames, passwords, and other bits of text from his browser's AutoFill featureHow-To
Secure Your Life in 12 Steps
Lock down your computer, your home network, your identity–even your phone.Answer Line
Too Many Antivirus Programs?
Keith has Norton AntiVirus, Malwarebytes' Anti-Malware, SUPERAntiSpyware, Windows Defender, and Windows Firewall. Is this overkill?How-To
How to Reset Your Wireless Router
Resetting your router can fix networking problems, and may be necessary for security reasons.Answer Line
I Emailed a Credit Card Number
Robert emailed credit card information to a business. Should he cancel the credit card?How-To
Leaving Your Job? Take Your Data With You
Whether you're leaving on your own timetable or departing with a pink slip in your hand, here's how to hit the bricks with your digital life intact.How-To
Protect Your Online Privacy (Without Reading All the Fine Print)
Before signing up for a new social network service or downloading that new application on your phone, read these privacy suggestions first.Answer Line
Do I Have a Freeloader on My WiFi?
Chris Beck wants to find out if there are unauthorized users on his wireless network.How-To
Get Started With a VPN: For Beginners, Power Users, and IT Pros
How to Choose and Use a VPN, For Beginners and Experts Get Started With a VPN at Any LevelHow-To
Stop Your Boss From Spying on You
Tired of having a corporate Big Brother looking over your shoulder? Here are a few easy ways to keep your employer from monitoring your online life.How-To
How to Monitor Your Employees’ PCs Without Going Too Far
How to Monitor Your Employees' PCs Without Going Too FarHow-To
How to Mine Customer Data the Right Way
Data mining can help you unearth hidden information about what your customers want–but you should avoid becoming a pariah or being singled out by the media for privacy violations. Here are the right methods to build a loyal customer following.Answer Line
Is VOIP Secure?
USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol phone callsBizFeed
Prevent E-mail Disasters: 5 Tools to Protect You from Slip-ups
A growing number of tech tools are now on hand to prevent the all-too-common e-mail faux pas.Answer Line
Is It Malware?
Amark found OpenCandy on a PC, and asked the Utilities forum if it's maliciousHassle-Free PC
How to Avoid Getting Burned by ‘Sneakware’
When you install Adobe Reader X, it tries to sneak a McAfee security scanner onto your system. A keen eye can help prevent this kind of thing.How-To
Firefox Tips, Plus a Warning: Protect Those Passwords
Follow these tips to make scrolling in Mozilla Firefox much smoother, plus a public service announcement: don't take password security lightly.How-To
Security on a Shoestring Budget
With the right mix of open-source tools, protecting your PCs and your network doesn’t have to break your bottom line.Hassle-Free PC
The Wrong Way to Manage Your Passwords
If you're storing your passwords in a Word document, Excel spreadsheet, or the like, you might as well just hand them over to hackers right now.Answer Line
More on Gaining Administrator Access Without a Password
Locked out of your PC's administrator account? I revisit an old question with a new answer.Tech Audit
When Nobody Is Watching Your Business, Security Systems Can
Keep an eye on your business with IP cameras.How-To