How to Use RedPhone for Android By Steven Martinez published 27 May 14 Find out how to make secure calls on your Android smartphone using RedPhone, to make sure no one's listening.
How to Reset Apple Safari By Paul Wagenseil published 21 May 14 Web browsers now include 'reset' buttons to swiftly get rid of browser-hijacking adware. Here's how to reset Apple Safari.
How to Reset Microsoft Internet Explorer By Paul Wagenseil published 21 May 14 Modern Web browsers include 'reset' buttons to swiftly get rid of browser-hijacking adware. Here's how to reset Internet Explorer.
How to Use Wickr Privacy App By Steven Martinez published 19 May 14 Using heavy encryption, Wickr makes temporary messaging simple. Here's how to get started.
Password-Management Software: How to Choose the Best By Chad Brooks published 14 May 14 Rather than writing passwords down on cheat sheets, you now can use special password-management software to keep track of them all.
How to Remove Akamai HD Adware By Marshall Honorof published 13 May 14 The Akamai HD adware can't harm your computer directly, but it may lead you to dangerous sites and software that can.
How to Protect Your Social Security Number By Fahmida Y. Rashid published 7 May 14 Your Social Security number is what an identity theft wants most. Here's how to protect your SSN, and who doesn't need to know it.
How to Disable Siri on the iOS 7 Lockscreen By Jill Scharr published 6 May 14 If you have Siri enabled on your iOS 7 device's lockscreen, your contacts may be accessible to savvy snoops. Here's how to prevent that.
How to Stop Your Smartphone from Stealing Your Identity By Sue Marquette Poremba published 28 April 14 Smartphones are treasure troves of personal data for identity thieves, yet few phone users know how to protect that information.
How to Beat Tax-Time Identity Thieves By Sue Marquette Poremba published 12 April 14 Tax time is Christmas for identity thieves, who use all sorts of tricks to separate you from your money. Here's how to beat them.
What Lightspark Player Pro Is, and How to Remove It By Jill Scharr published 10 April 14 Were you tricked into downloading the Lightspark Player Pro adware, or just sick of the popups? Here's how to get rid of it.
Heartbleed: Which Passwords You Need to Change By Paul Wagenseil published 10 April 14 Does Heartbleed mean you have to change all your passwords? Nope. Here's the breakdown on what has to, and doesn't have to, change.
Yahoo Mail and Heartbleed: How to Secure Your Account By Jill Scharr published 9 April 14 All of Yahoo is potentially at risk thanks to the Internet-wide Heartbleed security bug. Here's how to re-secure your account.
Heartbleed: Who Was Affected, What to Do Now By Paul Wagenseil published 9 April 14 Worried about the Heartbleed bug affecting millions of websites? Here's a step-by-step guide on what you can do to protect yourself.
Survive the XPocalypse: 10 Tips to Keep Running It Safely By Paul Wagenseil published 8 April 14 Follow this advice to keep using Windows XP safely even after Microsoft ends support.
How to Use TextSecure to Send Encrypted Text Messages By Jill Scharr published 17 March 14 TextSecure is an easy way for Android users to add extra security to SMS and MMS messages. Here's how to use the app.
How to Avoid Becoming a Victim of Sextortion By Katie Gatto published 12 March 14 Hollywood starlets aren't the only ones who need to worry about naked pictures online. Here's how to make sure it doesn't happen to you.
ASLR: What It Is and How It Protects You By Chad Brooks published 11 March 14 Address space layout randomization may be a mouthful, but it's also essential to protecting modern computer operating systems. Here's an explanation of what it is and how it works.
Computer Worms: What They Are and How to Stop Them By Tom's Guide Staff published 7 March 14 We hear a lot about viruses and Trojans, but not much about worms. What exactly is a computer worm, what does it do and how can you protect yourself from one?
Drive-By Downloads: How They Attack and How to Defend Yourself By Tom's Guide Staff published 6 March 14 Drive-by downloads are one of the most effective and sneaky ways of spreading malware, yet few people know they even exist. Here's an explanation of what they are, and how you can protect yourself against them.
How to Upgrade Snow Leopard to OS X Mavericks By Jill Scharr published 27 February 14 Apple has probably ended support for Mac OS X Snow Leopard 10.6. Here's how to make the free upgrade to Mavericks.
How to Install Adobe's Emergency Flash Player Update Right Now By Paul Wagenseil published 21 February 14 Adobe has rushed out an emergency patch for Flash Player on Windows, Mac, Linux and Android. Here's why you need to install this patch right now.
How to Encrypt Your Files and Folders By Jill Scharr published 20 February 14 When it comes to encrypting your files, you have a lot of options. Here are a few good ways to encrypt your files and folders.
How to Encrypt Files on iOS By Jill Scharr published 20 February 14 On iOS, encrypting your device is as easy as setting a passcode. Here's how to do it.
Trojan Horses: What They Are and How to Avoid Them By Tom's Guide Staff published 20 February 14 Trojan horses are among the most prevalent forms of malware, yet there's often little explanation of how they differ from computer viruses and worms.
How to Update Your Linksys Router By Jill Scharr published 19 February 14 Protect against TheMoon worm by upgrading your Linksys router to the latest firmware and following these instructions.
How to Create Standard and Administrator Accounts in Windows By Marshall Honorof published 19 February 14 Most Windows accounts have administrator rights, but this is risky. Learn how to create separate administrator and standard-user accounts.
How to Remove Conduit Search Adware By Marshall Honorof published 11 February 14 Conduit Search is an annoying piece of adware that piggybacks on software updates. Here’s how to remove it from Chrome, Firefox, IE and Safari.
How to Not Get Hacked at the Sochi Olympics — or Anywhere Else By Paul Wagenseil published 7 February 14 Despite a recent NBC News report, you're no more likely to be hacked in Russia than anywhere else. Here's how to make sure it doesn't happen.
How a Single Username Puts Your Security at Risk By Sue Marquette Poremba published 7 February 14 Use one username for all your online accounts? Here's how that puts you in danger, and how to fix it.