Robert LemosPCWorld

Veteran technology journalist Robert Lemos, a former research engineer, has covered technology and cybersecurity for almost two decades, winning numerous awards including a national journalism award in 2003 for his coverage of the MSBlast worm and recognition as a SANS Top Cyber Security Journalist in 2010 and 2014.

money wooden background

How greed could destroy the ransomware racket

Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing.

personal data digital security stock

All about your 'fullz' and how hackers turn your personal data into dollars

Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.

0511 primary

How to keep USB thumb drive malware away from your PC

Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.

computer data security keyboard hands programming developer

What to ask your doctor, lawyer, and accountant about protecting your personal data

Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security.

Cryptolocker ransomware

Ransomware's latest threats: What to do about CryptoWall, Chimera and their ilk

In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.

An Old Phone

Trust no one: How caller ID spoofing has ruined the simple phone call

Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.

W is for WordPress

The 3-step plan to make your website harder to hack

Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.

mcdonalds apple pay

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

Home automation security

5 steps to keep your smart home from being hacked

Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.

mobile security stock image one bad device

How to prevent mobile malware in 3 easy steps

Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.


Secure your home network—and every device attached to it—in 3 simple steps

If major companies can be breached, is there anything home users can do to escape the same fate? Plenty, say security experts.

password stock image

3 easy steps to save yourself from stupid passwords

We all have them, and now's the time to make them both hacker-proof and easier to manage.

thinkstockphotos 158695294

The easy Java and Flash security fix everyone hates to do

You know those nagging Java update boxes that pop up in your desktop? They're actually kind of important.

freefromransomware primary

How to prevent ransomware: What one company learned the hard way

Ransomware is on the rise. Your best protection? Something everyone knows they should do.

Internet of Things IoT stock

Internet of Things security check: How 3 smart devices can be dumb about the risks

Smartwatches, smart homes, smart connected cars: All carry software vulnerabilities that could impact your privacy or safety. But you can be smart about knowing the risks before you buy.