Password-Management Software: How to Choose the Best By Chad Brooks published 14 May 14 Rather than writing passwords down on cheat sheets, you now can use special password-management software to keep track of them all.
What Is a Banking Trojan? By Chad Brooks published 12 March 14 You may not have heard of them, but banking Trojans are the biggest online threat to American small businesses and homeowners. Here's an explanation of what they are and what to do.
ASLR: What It Is and How It Protects You By Chad Brooks published 11 March 14 Address space layout randomization may be a mouthful, but it's also essential to protecting modern computer operating systems. Here's an explanation of what it is and how it works.
Personally Identifiable Information: What It Is and How to Protect It By Tom's Guide Staff, Chad Brooks published 30 December 13 News reports often mention the 'personally identifiable information' that's lost in a data breach or cyberattack. What exactly makes up such information, and how can it be used against you?