How to Remove Akamai HD Adware By Marshall Honorof published 13 May 14 The Akamai HD adware can't harm your computer directly, but it may lead you to dangerous sites and software that can.
How to Protect Your Social Security Number By Fahmida Y. Rashid published 7 May 14 Your Social Security number is what an identity theft wants most. Here's how to protect your SSN, and who doesn't need to know it.
How to Disable Siri on the iOS 7 Lockscreen By Jill Scharr published 6 May 14 If you have Siri enabled on your iOS 7 device's lockscreen, your contacts may be accessible to savvy snoops. Here's how to prevent that.
How to Stop Your Smartphone from Stealing Your Identity By Sue Marquette Poremba published 28 April 14 Smartphones are treasure troves of personal data for identity thieves, yet few phone users know how to protect that information.
How to Beat Tax-Time Identity Thieves By Sue Marquette Poremba published 12 April 14 Tax time is Christmas for identity thieves, who use all sorts of tricks to separate you from your money. Here's how to beat them.
What Lightspark Player Pro Is, and How to Remove It By Jill Scharr published 10 April 14 Were you tricked into downloading the Lightspark Player Pro adware, or just sick of the popups? Here's how to get rid of it.
Heartbleed: Which Passwords You Need to Change By Paul Wagenseil published 10 April 14 Does Heartbleed mean you have to change all your passwords? Nope. Here's the breakdown on what has to, and doesn't have to, change.
Yahoo Mail and Heartbleed: How to Secure Your Account By Jill Scharr published 9 April 14 All of Yahoo is potentially at risk thanks to the Internet-wide Heartbleed security bug. Here's how to re-secure your account.
Heartbleed: Who Was Affected, What to Do Now By Paul Wagenseil published 9 April 14 Worried about the Heartbleed bug affecting millions of websites? Here's a step-by-step guide on what you can do to protect yourself.
Survive the XPocalypse: 10 Tips to Keep Running It Safely By Paul Wagenseil last updated 18 December 19 Follow this advice to keep using Windows XP safely even after Microsoft ends support.
How to Use TextSecure to Send Encrypted Text Messages By Jill Scharr published 17 March 14 TextSecure is an easy way for Android users to add extra security to SMS and MMS messages. Here's how to use the app.
How to Avoid Becoming a Victim of Sextortion By Katie Gatto published 12 March 14 Hollywood starlets aren't the only ones who need to worry about naked pictures online. Here's how to make sure it doesn't happen to you.
ASLR: What It Is and How It Protects You By Chad Brooks published 11 March 14 Address space layout randomization may be a mouthful, but it's also essential to protecting modern computer operating systems. Here's an explanation of what it is and how it works.
Computer Worms: What They Are and How to Stop Them By Tom's Guide Staff published 7 March 14 We hear a lot about viruses and Trojans, but not much about worms. What exactly is a computer worm, what does it do and how can you protect yourself from one?
Drive-By Downloads: How They Attack and How to Defend Yourself By Tom's Guide Staff published 6 March 14 Drive-by downloads are one of the most effective and sneaky ways of spreading malware, yet few people know they even exist. Here's an explanation of what they are, and how you can protect yourself against them.
How to Upgrade Snow Leopard to OS X Mavericks By Jill Scharr published 27 February 14 Apple has probably ended support for Mac OS X Snow Leopard 10.6. Here's how to make the free upgrade to Mavericks.
How to Install Adobe's Emergency Flash Player Update Right Now By Paul Wagenseil published 21 February 14 Adobe has rushed out an emergency patch for Flash Player on Windows, Mac, Linux and Android. Here's why you need to install this patch right now.
How to Encrypt Your Files and Folders By Jill Scharr published 20 February 14 When it comes to encrypting your files, you have a lot of options. Here are a few good ways to encrypt your files and folders.
How to Encrypt Files on iOS By Jill Scharr published 20 February 14 On iOS, encrypting your device is as easy as setting a passcode. Here's how to do it.
Trojan Horses: What They Are and How to Avoid Them By Tom's Guide Staff published 20 February 14 Trojan horses are among the most prevalent forms of malware, yet there's often little explanation of how they differ from computer viruses and worms.
How to Update Your Linksys Router By Jill Scharr published 19 February 14 Protect against TheMoon worm by upgrading your Linksys router to the latest firmware and following these instructions.
How to Create Standard and Administrator Accounts in Windows By Marshall Honorof published 19 February 14 Most Windows accounts have administrator rights, but this is risky. Learn how to create separate administrator and standard-user accounts.
How to Remove Conduit Search Adware By Marshall Honorof published 11 February 14 Conduit Search is an annoying piece of adware that piggybacks on software updates. Here’s how to remove it from Chrome, Firefox, IE and Safari.
How to Not Get Hacked at the Sochi Olympics — or Anywhere Else By Paul Wagenseil published 7 February 14 Despite a recent NBC News report, you're no more likely to be hacked in Russia than anywhere else. Here's how to make sure it doesn't happen.
How a Single Username Puts Your Security at Risk By Sue Marquette Poremba published 7 February 14 Use one username for all your online accounts? Here's how that puts you in danger, and how to fix it.
How to Install Secure Browsing on an Android Device By Paul Wagenseil published 6 February 14 The Electronic Frontier Foundation's HTTPS Everywhere browser plugin is available for Firefox for Android. Here's how to install it.
Browser Settings Hijacked? How to Use Chrome's Reset Tool By Elizabeth Palermo published 5 February 14 Browser taken over by ads and weird toolbars? Here's how to get rid of them in Google Chrome.
Still Running Windows XP? Here's What to Do When Support Ends By Linda Rosencrance last updated 18 December 19 After April 8, Microsoft is yanking support for Windows XP. But what if you can't upgrade? Here's what to do.
ICE Unlock Hands-on: App Adds Fingerprint Security to Android By Jill Scharr published 29 January 14 The new ICE Unlock Android app lets Android phone owners unlock their devices via the rear-facing camera, but how well does it work?
Spyware: What It Is, and How to Remove It By Tom's Guide Staff last updated 5 October 22 We've heard a lot about spyware, but what exactly is it and how does it differ from other kinds of malware?