You're already cleaning up your house for the summer months, so why not extend that DIY attitude to your PC too?
Stored files are vulnerable to cut-and paste clumsiness or to links embedded in shared documents
Scammers claim they found a bug in the remote access tool two years ago
...but that's not quite true.
We're all used to lengthy web addresses, but an early Chrome feature suggests Google might try to do away with them.
Users think they will get access to their friends' accounts, but their account is hacked instead
Samsapo uses a worm-like characteristic to spread to other Android devices
Cybercriminals used a combination of SMS and voice phishing techniques to obtain debit card details from bank customers
The security flaw got more consumers to change their passwords and start using two-factor authentication
The vulnerability was used in attacks against users in Syria, but will likely see wider exploitation, Kaspersky Lab researchers said.