Don't-Miss Security Stories

pgpencryption primary

How to use OpenPGP to encrypt your email messages and files in the cloud

When online services lack privacy controls, you can roll your own using near military-grade encryption.

How to use Gmail 2-step verification on multiple devices

You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices.

0815 primary

Why spammers persist despite filters and well-informed users

Our email clients filter them out. We know all of their tricks. Yet the spam keeps coming. Here's why.

cipherinwindows8 1

How to securely overwrite deleted files with a built-in Windows tool

When you delete a file in Windows, you're just removing the pointer. The data is still there. Here's how to make sure that data is gone, baby, gone.

How to create an anonymous email account

It's not just dissidents looking for anoymous email, but everyday people who'd rather not reveal their true identity.

0707 primary

Some files need encryption and some files don't

Chances are you don't have to encrypt your entire hard drive. But you need to know what files to encrypt.

Take precautions when using Gmail—or any other email service

Google's almost ubiquitous email client doesn't guarantee that your email will be private, or that your account won't be hacked. But the right precautions can give you reasonable protection.

0512 primary

You've fallen for a scam! Now what?

We all make mistakes. Here's what you need to do after realizing that you have been had, and keep those mistakes from costing you.

Revoke Tweet Deck access for Twitter

How to keep the XSS TweetDeck bug from posting on your behalf

The XSS Hole in TweetDeck is more than a nuisance. If you're a user of the popular Twitter client, here's how to protect yourself, step by step.

facebook

Can your ISP read what you send over Facebook?

Your Internet service provider knows an awful lot about you. But when you’re on Facebook, your ISP is the least of your privacy worries.

bitlockericonhero

A beginner's guide to BitLocker, Windows' built-in encryption tool

Now that TrueCrypt is seemingly gone, here's how to get started with BitLocker, the encryption tool Microsoft built right into many versions of Windows.

authylogo

Get two-factor authentication on the desktop with Authy

A new app lets you generate two-factor authentication codes on your desktop PC. Here's how it works.

killdatadead primary 100225281 large

Definitely deleted: How to guarantee your data is truly gone before recycling old PCs and drives

Hitting 'delete' is just the beginning. Depending on the type of storage and the sensitivity of the information, there are other things you need to do to make sure your deleted files are gone for good.