We hear a lot about viruses and Trojans, but not much about worms. What exactly is a computer worm, what does it do and how can you protect yourself from one?
Drive-by downloads are one of the most effective and sneaky ways of spreading malware, yet few people know they even exist. Here's an explanation of what they are, and how you can protect yourself against them.
Trojan horses are among the most prevalent forms of malware, yet there's often little explanation of how they differ from computer viruses and worms.
We've heard a lot about spyware, but what exactly is it and how does it differ from other kinds of malware?
Now that 3D printing is hitting its stride, mainstream technology companies are thinking about entering the 3D-printing marketplace.
This article was originally published at The Conversation. The publication contributed the article to Tom's Guide's Expert Voices: Op-Ed & Insights. The massive Consumer Electronics Show (CES), hosted annually in Las Vegas, showcases the latest disc
When hackers bring down a website, they're not really damaging it; they're just blocking your access to it. Here's how distributed denial-of-service attacks work, and what website operators can do to avoid being knocked offline.
We often hear about 'botnets' formed by countless 'zombie' computers herded together by http://admin.bestofmedia.com/contentmgr3/cybercriminals. But what exactly is a botnet, and what danger does it pose to the average computer user?
Security experts constantly tell computer users to protect themselves against viruses. But what exactly is a computer virus, and is it the same thing as a computer worm or Trojan horse?
Use these shortcuts for some of the more complicated functions in Microsoft Excel and be more productive in the use of the spreadsheet program.
News reports often mention the 'personally identifiable information' that's lost in a data breach or cyberattack. What exactly makes up such information, and how can it be used against you?
Aspiring to be the next Henri Cartier-Bresson or Bill Cunningham street photographer? Fashion photographer Marcy Swingle offers her pro tips.
Use these shortcuts to better navigate Microsoft Excel and be more productive in the use of the spreadsheet program.
A Web bot is an automated software program used to perform relatively simple and repetitive online tasks that would otherwise be too difficult or mundane for a human to continuously perform.
A court ruling may soon end 20 years of 'net neutrality.' Here's how that would change the Internet as we know it.
Shadow Fall is a shiny, good-looking game that introduces some basic next-gen concepts, but ultimately lacks a strong sense of self.
Two-factor authentication is a security measure that requires users to provide two means of verification to access a service.
Hubs, switches and routers make computer networking, and the Internet, possible. Yet most of us don't know what they are, or how they work.
The Blackhole Exploit Kit is a malicious code that can be illegally injected on legitimate but hacked websites.
Watch a player use the Xbox One to jump between games and films, and Skype with friends, in this new video from Microsoft.
Missing 80s video games like 'Pac-Man' or the adaptation of 'The Hobbit'? Archive.org will let you take them for a spin via your web browser.
In a man in the middle attack, communications between client and server are intercepted, often to steal passwords or account numbers.
A new 'Reminder Button' for 11 TV networks' websites and apps alerts you with email or in-app notification and even lets you set the DVR.