CCleaner is a tremendously useful free application that can remove digital clutter and unwanted adware. Here's how to install and use it.
Malwarebytes Anti-Malware is a powerful, free tool that gets rid of adware and other unwanted programs. Here's how to install and use it.
From remote-impersonation scams and sextortion to fake antivirus and tech support, here are the threats you need to know.
Synthetic identity theft combines real and fake data to create a Frankenstein profile. Here's how it hurts you, and how to protect yourself.
The browser hijacker V9 may have snuck its way onto your computer and changed your Web settings. Here's how to remove it.
BrowserSafeguard is a common potentially unwanted program that may install itself without your permission. Here's how to remove it.
PC Optimizer Pro is a potentially unwanted program that can be difficult to remove from your computer. Here's how to get rid of it.
Trovi Search isn't malware, but an extremely annoying browser hijacker that can be hard to remove. Here's how to get rid of it.
RegClean Pro, a system optimizer, often appears as a potentially unwanted program and can damage a PC. Here's how to get rid of it.
The light and free AdwCleaner can quickly get rid of adware and other potentially unwanted programs. Here's how to install and use it.
Users of mobile banking apps have to protect themselves from cyberthieves. Here are eight tips to keep you safe while you bank on the fly.
Identity thieves are zeroing in on affluent people. If you're a wealthy individual, here's how to protect yourself and your money.
Senior citizens make very attractive targets for identity thieves. Here are five tips to help seniors protect their identities.
After April 8, Microsoft is yanking support for Windows XP. But what if you can't upgrade? Here's what to do.
The latest version of Android adds many useful security features, but it doesn't address the mobile platform's underlying problem.
Windows 8.1 added significant security enhancements, but how much difference will they make for the average end user?
Despite your best efforts, your email account has been hacked. Now what do you do? Here are 7 steps to keep you and your contacts safe.
Crooks are smart about installing ATM skimmers to steal your card data. But you can still protect yourself. Here’s how to tell whether an ATMs has any illicit add-ons.
With more information than ever being stored on computers, smartphones and tablets, it's important to keep prying eyes out of your data.