Don't-Miss Security Stories
Lenovo consumer PCs used to have a lot of bloatware, but the company cleaned up its act after getting burned on one bad program earlier this year.
Arrange to give loved ones access to key online accounts. Don't worry, you won't lose control.
Connection errors are annoying, but they usually require a simple fix.
Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.
Your mobile IP address isn't likely to be stolen. But you still need to take precautions.
Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
Cloud storage is convenient, but you can remove any concerns about security or other issues if you do what they do yourself.
Instead of just waiting for your phone manufacturer to issue a patch, there are a few ways you can be proactive.
Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.
Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
Downloading a little-known program can be scary. Take these steps to protect yourself.
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.