Don't-Miss Security Stories
You'll be a happier 1Password user once you master these mobile tips and tricks, from unlocking 1Password with your fingerprint to entering passwords with the 1Password keyboard.
Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.
There are plenty of ways to keep your Android handset safe from the most common security threats, all with a minimum of effort. Read on to learn about the right passcodes, security settings and other safeguards.
Total online privacy is almost impossible, but these steps will get you a lot closer to being as anonymous as possible.
Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.
Creating a solid backup strategy is easier than you think. Here's how to back up your PC the right way.
The government may soon allow your ISP to sell your browsing data. Here's how to fight back.
Protect your data from the Turkish Crime Family demanding ransom from Apple—or from any hackers and creeps, for that matter. It's really quite easy to set up.
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Dealing with passwords will probably never be painless, but you can at least simply the process.
You can set your Android phone to unlock itself when it's in your pocket, while you're near a certain location, when it hears your voice, and more.
You don't necessarily have to spend money, but free VPN apps come with some drawbacks.
If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC.
We'll show you how to protect your online privacy as governments around the world, including the U.S., step up their online surveillance efforts.
Don't let your smart clock expose you to hackers. A web app from BullGuard can help.
After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups
CSO Online's Steve Ragan infects a laptop with Locky Ransomware
A trusted virtual private network is a great tool for security and privacy, but if it's not configured correctly it may not be so private.
Facebook's new encrypted messaging feature, Secret Conversations, is now live for everyone on Android and iOS.
Windows Defender in the Anniversary Update loves to tell you what it's doing. Here's how to stop that.