Don't-Miss Security Stories
Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.
Downloading a little-known program can be scary. Take these steps to protect yourself.
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.
You delete a file, then empty the recycle bin. But the contents of that file remains on your drive. Here's what to do about that.
A helping of essential tips from the company's own lead security engineer, Adrian Ludwig.
Want a copy of your personal Google search history for your very own? Now you can export and download it, though it's in a funky file format.
Maybe there's weird activity on your home network. Maybe your ISP's asking about illegal online dealings. That's when you need to check your IP address.
Making your home smart could also make it insecure. We'll show you how to avoid the most common pitfalls.
Planning a trip overseas with your laptop? These precautions will help with smooth sailing.
You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.
Lenovo has been preloading new consumer PCs with Superfish adware that injects ads and hijacks the secure HTTPS encryption of every site you visit. Eradicating the threat isn't easy, but here's how, complete with a new automated tool.