A virtual private network (VPN) creates a secure connection to a private server from a remote location.
Most home Internet routers have serious security flaws, with some so vulnerable to attack they should be thrown out, an expert warns.
Web browsers now include 'reset' buttons to swiftly get rid of browser-hijacking adware. Here's how to reset Google Chrome.
Modern Web browsers include 'reset' buttons to swiftly get rid of browser-hijacking adware. Here's how to reset Mozilla Firefox.
The Control Center in Ring's app for its video doorbells and home security cameras lets you manage all your privacy and security settings. Here's how to use it.
Beware unsolicited callers who say something is wrong with your computer and that they can fix it. Here's how to tell a legit call from a scam.
Follow these steps to turn on two-factor authentication (2FA) for Ring Video Doorbell and Ring security cameras.
Having a Social Security number stolen is the most severe form of identity theft. Here's what to do if it happens to you.
Get your packages delivered safely. Here's how to stop porch pirates and prevent stolen packages from Amazon and more this holiday season.
Here's how to avoid cybercrooks and scammers to shop safely on Cyber Monday -- and throughout the holiday season.
Cybercriminals and advertisers are just waiting for you to head to shopping malls and retails websites on Black Friday. Here's how to avoid their traps.
With police asking Amazon to turn over data sent from an Alexa-powered Echo speaker, here's how to manage your Alexa history and recordings.
Google makes it pretty easy to manage your third-party app permissions, which you should do every so often.
We show you how to locate, lock or erase your lost or stolen iPhone in a few quick steps using the Find My iPhone feature in your settings.
Most people won't get much money from the Equifax data-breach settlement, but the free identity protection is worth quite a bit.
The only way to stop your Venmo transactions from being public is to set them to private. Here's how.
Here's how to update WhatsApp to helps make sure your phone is safe from the spyware targeting Android and iOS devices.
If you want to ditch Instagram, follow these step-by-step instructions for deactivating your account.
Here are the steps you should take if you know your personal information has been compromised in a data breach.
Identity theft is a pervasive problem, yet there are simple steps you can take to avoid becoming the next victim.
If your identity's just been stolen, don't panic -- be proactive. Here are six simple things you need to do right now.
A toddler locked his dad out of an iPad for 48 years. Here are some simple tips on how to unlock and restore an iPad or iPhone.
Here’s how to install and use Telegram to get fully encrypted, self-destructing, non-intrusive messaging.
When you ditch your computer or smartphone, do you wipe it clean? How about your work computer? Here's how to leave no trace of yourself.