How to Remove Lenovo's Alleged 'Bootkit' Software By Henry T. Casey published 12 August 15 Lenovo appears to have installed a BIOS-level utility that adds non-Microsoft software to 'clean' installations of Windows.
How To Scan an Android Device for Stagefright Vulnerability By Henry T. Casey published 7 August 15 A whopping 95 percent of Android devices are at risk of hijack-via-text message from the Stagefright Vulnerability. Here's how to find out if your phone or tablet is still vulnerable.
How to Use Facebook's Security Checkup By Henry T. Casey published 3 August 15 It's always a good time to make sure you've secured your Facebook account, so here's how to use the social network's Security Checkup.
How To Escape the iOS Crash Pop-Up Scam By Henry T. Casey published 17 July 15 Fake crash report scams are targeting iOS users via Safari and other in-app web browsers -- here's how to break free from them.
How to Install, Use Malwarebytes Anti-Malware for Mac By Henry T. Casey published 16 July 15 With the Mac version of its free Anti-Malwarebytes software, Malwarebytes comes to rescue Apple users plagued by browser-hijacking adware.
How To Secure Your Snapchat With Two-Factor Authentication By Henry T. Casey published 11 June 15 Snapchat wasn't always the safest platform, but the service popular for self-destructing photos has now added an important security measure.
How to Use BitTorrent's Bleep Private Messaging and Calling By Cherlynn Low published 13 May 15 BitTorrent's new app is a secure, peer-to-peer voice-call and messaging client that keeps conversations off the cloud. Here's how to use it.
How to Disable Verizon's Wireless Tracking Supercookie By Marshall Honorof published 1 April 15 You can now disable Verizon's tracking 'supercookie' on your smartphone, but you'll have to be proactive and follow a few simple steps.
How to Stay One Step Ahead of Hackers By Sue Marquette Poremba published 24 March 15 Cyberthreats always evolve, but the way people think about security is often years behind. Here's how to keep up with current threats.
The FREAK Flaw: How to Protect Yourself By Paul Wagenseil published 4 March 15 The FREAK flaw is a serious threat, but not all Web browsers are vulnerable. Here's what is affected, and what to do about it.
Lenovo's Security-Killing Adware: How to Get Rid of It By Paul Wagenseil published 20 February 15 Lenovo installed adware on PCs that put consumers at risk of fraud, malware and identity theft. Here's what it is, and how to get rid of it.
How to Turn On Apple's Two-Step Verification By Valentina Palladino published 17 February 15 To better protect your text and videos messages, Apple has finally extended two-step verification to iMessage and FaceTime.
How to Secure Your IoT Devices By Sue Marquette Poremba published 27 January 15 Have a fitness band, smart thermostat or other smart IoT device? Here's how to make sure it's secure.
BitTorrent Beginner's Guide: Everything You Need to Know By Andy Patrizio published 24 October 14 BitTorrent file-sharing technology isn't just for pirates. Here's how to access the rich troves of legitimate and legal content.
How to Erase Your iPhone, Android or Windows Phone By Chris Hutton published 12 September 14 You bought a new phone. You want to sell your old phone. Here’s how to remove your personal data before handing the phone over to a stranger.
How to Prevent Your Nude Photos from Going Online By Paul Wagenseil published 1 September 14 Don't share Jennifer Lawrence's embarrassment. Take steps to make sure your nude selfies don't end up on the Internet.
How to Remove V9 By Linda Rosencrance published 27 August 14 The browser hijacker V9 may have snuck its way onto your computer and changed your Web settings. Here's how to remove it.
12 Computer Security Mistakes You're Probably Making By John Corpuz published 27 August 14 Here are 12 common mistakes that result in malware infections, computer viruses or getting your computer outright hacked.
How to Remove Browser Safeguard By Linda Rosencrance published 7 August 14 BrowserSafeguard is a common potentially unwanted program that may install itself without your permission. Here's how to remove it.
How to Remove PC Optimizer Pro By Linda Rosencrance published 21 July 14 PC Optimizer Pro is a potentially unwanted program that can be difficult to remove from your computer. Here's how to get rid of it.
How to Remove Trovi Search By Linda Rosencrance published 14 July 14 Trovi Search isn't malware, but an extremely annoying browser hijacker that can be hard to remove. Here's how to get rid of it.
How to Remove RegClean Pro By Linda Rosencrance published 8 July 14 RegClean Pro, a system optimizer, often appears as a potentially unwanted program and can damage a PC. Here's how to get rid of it.
5 Essential iPhone Security Tips to Keep Your Data Safe By Cherlynn Low published 13 June 14 Despite its reputation, the iPhone's security isn't perfect. Here are five things you need to do to lock down your device.
How to Install and Use AdwCleaner By Linda Rosencrance published 9 June 14 The light and free AdwCleaner can quickly get rid of adware and other potentially unwanted programs. Here's how to install and use it.
Mobile Banking: 8 Tips to Protect Yourself By Linda Rosencrance published 30 May 14 Users of mobile banking apps have to protect themselves from cyberthieves. Here are eight tips to keep you safe while you bank on the fly.
How to Lock Down Your Twitter Privacy Settings By David Murphy published 30 May 14 Just because you like Twitter doesn't mean you don't have a right to privacy. Here's how to lock down the essential settings.
10 Facebook Privacy and Security Settings to Lock Down By David Murphy published 30 May 14 Stop sharing absolutely everything with the public. Lock down your Facebook account with these privacy and security settings.
Why the Wealthy Are Prime Targets for Identity Theft By Linda Rosencrance published 29 May 14 Identity thieves are zeroing in on affluent people. If you're a wealthy individual, here's how to protect yourself and your money.
How Jailbreaking Puts Your iPhone at Risk By Jesse Emspak published 28 May 14 Many people 'jailbreak' iPhones without realizing the security risks. Here's what jailbreakers need to know, and do, to keep devices safe.
How to Use RedPhone for Android By Steven Martinez published 27 May 14 Find out how to make secure calls on your Android smartphone using RedPhone, to make sure no one's listening.