Don't-Miss Security Stories
Though shelved for now, if legislation like SOPA and the PROTECT IP Act ever passes, it may require your ISP to start monitoring your online activity with deep packet inspection software. Make sure you understand how it works, and how you can fight back.
Hackers can exploit email to hack into your work accounts. But these simple techniques can help protect your email account and company data.
Did an infection seemingly wipe out all your icons, programs, and data? Fear not: They might just be hidden. Here's how to restore them.
E-signatures are easier than ever to make, thanks to Adobe Reader and other services. Best of all, you can say farewell to that dusty fax machine forever.
Malware infected Jazzy007's PC, and his data disappeared. He asked the Answer Line forum for help.
Skimmers could steal your financial information at the ATM—or even at your local supermarket. Here's how to protect yourself.
John asked if he and his neighbor could share one Internet access account
You still need to keep data security in mind when playing games online, as recent incidents have shown. To that end, here are some safeguards you can take.
Knowing these terms won’t make you a security expert—but they’ll provide a good head start on the jargon.
Mashoreen asked the Answer Line forum why taskhost.exe--usually a small background application--was consuming 50-percent of his CPU.
Although it may be unlikely for a hacker to set a printer on fire remotely, printing security is too easily forgotten. Here's how you can make your print environment more secure.
Securing your wireless network is a simple process that costs nothing and could save you from a disastrous network breach down the road.
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking
Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.