Don't-Miss Security Stories

An Old Phone

Trust no one: How caller ID spoofing has ruined the simple phone call

Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.

W is for WordPress

The 3-step plan to make your website harder to hack

Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.

mcdonalds apple pay

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

android malware

The dangers of Android malware may be exaggerated, but you should still play it safe

Not everyone agrees that Android malware seriously threatens security. But taking precautions is still a good idea.

hack security malware

Five precautions for avoiding malware when you download and install software

Downloading a little-known program can be scary. Take these steps to protect yourself.

mobile security stock image one bad device

How to prevent mobile malware in 3 easy steps

Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.


How to easily secure your web browsing with TunnelBear's free Chrome extension

Only need VPN-like protection for your browser and not your whole desktop? Check out TunnelBear for Chrome and Chrome OS.

You can securely wipe your files, hard drive or SSD with one of these free utilities

You delete a file, then empty the recycle bin. But the contents of that file remains on your drive. Here's what to do about that.


Google's essential tips for how to keep your Android phone safe

A helping of essential tips from the company's own lead security engineer, Adrian Ludwig.

google logo

How to download your entire Google search history

Want a copy of your personal Google search history for your very own? Now you can export and download it, though it's in a funky file format.

0316 primary cybercrook

What to do if someone steals your IP address

Maybe there's weird activity on your home network. Maybe your ISP's asking about illegal online dealings. That's when you need to check your IP address.

Smart home tablet

How to keep your connected home safe: 7 steps you can take to boost home security

Making your home smart could also make it insecure. We'll show you how to avoid the most common pitfalls.

0305 primary airport

Prepare to take your laptop to another country

Planning a trip overseas with your laptop? These precautions will help with smooth sailing.

0302 primary

Recover a stolen laptop, or prepare for the day your laptop is stolen

You may or may not be able to recover your stolen laptop, but the precautions you take beforehand can put the odds in your favor.


How to remove the dangerous Superfish adware preinstalled on Lenovo PCs

Lenovo has been preloading new consumer PCs with Superfish adware that injects ads and hijacks the secure HTTPS encryption of every site you visit. Eradicating the threat isn't easy, but here's how, complete with a new automated tool.