Don't-Miss Security Stories

1112 primary spyware

Why Lenovo's PCs have less bloatware or spyware than ever before

Lenovo consumer PCs used to have a lot of bloatware, but the company cleaned up its act after getting burned on one bad program earlier this year.

1028 primary elderly

Sharing passwords: One way to save a lot of heartache in case of senility, accident, or death

Arrange to give loved ones access to key online accounts. Don't worry, you won't lose control.

SSL padlock icon

HTTPS errors: What to do when your PC freaks out

Connection errors are annoying, but they usually require a simple fix.


The quick and easy way to find the best antivirus software

Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.

0821 primary

Your mobile IP address: Its safety is one thing, its privacy is another

Your mobile IP address isn't likely to be stolen. But you still need to take precautions.

An Old Phone

Trust no one: How caller ID spoofing has ruined the simple phone call

Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.

0730 primary

Cloud storage alternatives: Three ways to sync your own data securely and privately

Cloud storage is convenient, but you can remove any concerns about security or other issues if you do what they do yourself.

angry android

How to protect yourself from the Stagefright security flaw

Instead of just waiting for your phone manufacturer to issue a patch, there are a few ways you can be proactive.

W is for WordPress

The 3-step plan to make your website harder to hack

Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.

mcdonalds apple pay

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

android malware

The dangers of Android malware may be exaggerated, but you should still play it safe

Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.

Home automation security

5 steps to keep your smart home from being hacked

Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.

hack security malware

Five precautions for avoiding malware when you download and install software

Downloading a little-known program can be scary. Take these steps to protect yourself.

mobile security stock image one bad device

How to prevent mobile malware in 3 easy steps

Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.


How to easily secure your web browsing with TunnelBear's free Chrome extension

Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.