Don't-Miss Security Stories
All those online services and accounts you've let languish are like zombies waiting to rise from the grave and bite you. Here's how to deal with the digital undead.
Trinu, who keeps sensitive data inside AES-encrypted .zip archives, asked the Answer Line forum about the advantages and disadvantages of switching to TrueCrypt.
How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.
Tired of entering your password every time you boot your PC? Here's how to turn that option off.
Are you doing everything necessary to keep your PC safe? These utilities can fill in the gaps left by traditional antivirus software.
Microsoft has released a confusing selection of security programs over the years. Deborah Armstrong asked me to make sense of them.
We give you essential tips and tools for hiding your IP address and surfing the Web in blissful anonymity.
Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe.
It's all too easy to click the wrong button or link on an otherwise legitimate download page. Here are three ways to protect yourself.
Justin Yuen asked if it's possible to recover a stolen laptop.
KenWid10 asked the Antivirus & Security Software forum how best to send encrypted information to someone over the Internet
In the grand scheme of digital security, passwords have become self-defeating, often impotent tools. We need too many of them, and the strong ones are too hard to remember. Luckily, however, you can improve today's passwords with proper management, and tomorrow's security tech may eliminate passwords completely.
After discovering how easy it is to recover data from a hard drive removed from one PC and attached to another, Melker asked the Hard Drives, NAS Drives, Storage forum if password protecting Windows actually protects your data.