Windows 8 is a major OS overhaul, but some of the most important additions might be the ones you can't see. Here's a look at Windows 8's new security tools and features.
Here's a great collection of tools for anyone responsible for administering servers or services in the cloud.
A poorly protected office printer can cause major security headaches. Here's what the threats are, and how you can combat them.
Data encryption is a complicated subject, but our top-level overview and general guide to email encryption will help you understand the basics. Learn to encrypt your Internet connection, sent and stored email with this basic tutorial.
Here's everything you need to know about cloud computing, plus reviews of three service providers.
Security holes leave even a password-protected Wi-Fi network vulnerable to hacking. Here’s how to defend yours.
Great antivirus and antitheft for Android phones and tablets, but very pricey despite lacking features that some free apps provide.
Great free antivirus and antitheft protection for Android phones; but for remote functionality, the app requires sending SMS commands.
Whether or not Android's openness makes it an easy target for malware writers, these apps can help protect your handset.
If you lose your Android smartphone and didn't proactively install a security or remote locator app, you can still find your missing phone by following our handy guide.
Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good.
Although a consumer-level router is good enough for some small businesses, you need stronger, more secure equipment that can handle traffic among many users. Here are the must-have features in a serious router.
Before you lock your company into a contract, consider these tips--they'll help you read between the lines of the carriers' fine print and make the smartest choice.
Setting up your PC to run important apps in a sandbox can help you avoid malware infections. Here's how to do it.