Join Tom's Guide for a very special 24-hour Ask Me Anything sessions with the Electronic Frontier Foundation, March 4 (and read our explainer).
We select the best of the best new products at the world's biggest tech show, including 4K TVs, wearables, smart home, VR, computing and more.
Which gadgets caught your eye at CES 2015? Let us know, and help us select winners for the Readers' Choice awards.
2014 was a great year for video games, but it had its share of stinkers. Here are the games that let us down the most in the past 12 months.
The Plantronics BackBeat Fit over-the-ear headphones have solid sound, and touchy but useful controls.
Stumped by the video-game jargon your friends, family and co-workers toss around? Here's our glossary of gaming terms.
This article was originally published at The Conversation. The publication contributed the article to Tom's Guide's Expert Voices: Op-Ed & Insights.Coldplay has barred music streaming service Spotify from adding their latest album Ghost Stories to i
With Oculus Rift and other systems transforming gaming, how are people evolving their experiences with the new technologies?
In April, Microsoft will stop supporting Windows XP. If you're still running it, here's how to migrate to a better, safer operating system.
We hear a lot about viruses and Trojans, but not much about worms. What exactly is a computer worm, what does it do and how can you protect yourself from one?
Drive-by downloads are one of the most effective and sneaky ways of spreading malware, yet few people know they even exist. Here's an explanation of what they are, and how you can protect yourself against them.
Trojan horses are among the most prevalent forms of malware, yet there's often little explanation of how they differ from computer viruses and worms.
We've heard a lot about spyware, but what exactly is it and how does it differ from other kinds of malware?
Now that 3D printing is hitting its stride, mainstream technology companies are thinking about entering the 3D-printing marketplace.
This article was originally published at The Conversation. The publication contributed the article to Tom's Guide's Expert Voices: Op-Ed & Insights. The massive Consumer Electronics Show (CES), hosted annually in Las Vegas, showcases the latest disc
When hackers bring down a website, they're not really damaging it; they're just blocking your access to it. Here's how distributed denial-of-service attacks work, and what website operators can do to avoid being knocked offline.
We often hear about 'botnets' formed by countless 'zombie' computers herded together by http://admin.bestofmedia.com/contentmgr3/cybercriminals. But what exactly is a botnet, and what danger does it pose to the average computer user?
Security experts constantly tell computer users to protect themselves against viruses. But what exactly is a computer virus, and is it the same thing as a computer worm or Trojan horse?
Use these shortcuts for some of the more complicated functions in Microsoft Excel and be more productive in the use of the spreadsheet program.
News reports often mention the 'personally identifiable information' that's lost in a data breach or cyberattack. What exactly makes up such information, and how can it be used against you?