How to Install Secure Browsing on an Android Device By Paul Wagenseil published 6 February 14 The Electronic Frontier Foundation's HTTPS Everywhere browser plugin is available for Firefox for Android. Here's how to install it.
Browser Settings Hijacked? How to Use Chrome's Reset Tool By Elizabeth Palermo published 5 February 14 Browser taken over by ads and weird toolbars? Here's how to get rid of them in Google Chrome.
Still Running Windows XP? Here's What to Do When Support Ends By Linda Rosencrance published 3 February 14 After April 8, Microsoft is yanking support for Windows XP. But what if you can't upgrade? Here's what to do.
ICE Unlock Hands-on: App Adds Fingerprint Security to Android By Jill Scharr published 29 January 14 The new ICE Unlock Android app lets Android phone owners unlock their devices via the rear-facing camera, but how well does it work?
How to Set Up Parental Controls on Your iPhone By Anna Attkisson published 15 January 14 Here's a step-by-step tutorial on how to set restrictions (parental controls) for movies, TV shows, adult content and more on your iPhone.
DDoS Attacks: What They Are, and How to Defend Against Them By Tom's Guide Staff published 4 January 14 When hackers bring down a website, they're not really damaging it; they're just blocking your access to it. Here's how distributed denial-of-service attacks work, and what website operators can do to avoid being knocked offline.
Personally Identifiable Information: What It Is and How to Protect It By Tom's Guide Staff, Chad Brooks published 30 December 13 News reports often mention the 'personally identifiable information' that's lost in a data breach or cyberattack. What exactly makes up such information, and how can it be used against you?
Adobe Data Breach: How to Protect Yourself By Jill Scharr published 6 November 13 A lesson in the importance of strong encryption comes at the expense of 38 million Adobe users. Here's what you can do to protect your data.
How to Encrypt Your Android Phone or Tablet By Jill Scharr published 28 October 13 Encrypting your Android device adds a strong layer of security, and it's easy to do. Here's how.
How to Set a PIN Lock or Password in iOS 7 By Marshall Honorof published 24 October 13 If you want to keep your iOS 7 device safe from prying eyes, one of the easiest ways to do it is to turn on a passcode lock.
How to Use Malwarebytes' Anti-Virus App for Android By Cherlynn Low published 22 October 13 The well-regarded anti-virus software maker Malwarebytes introduced its first mobile security app. Here's how to use it.
How Seniors Can Reduce the Risk of Identity Theft By Sue Marquette Poremba published 18 October 13 Why are seniors such a susceptible target for identity thieves, and how can they learn the difference between a scam and the real deal?
How to Make Your Yahoo Email More Secure By Paul Wagenseil published 16 October 13 Yahoo will encrypt its Webmail service in January, but why wait? Here's how to make your Yahoo Mail safer today.
How to Let Your Twitter Followers Direct-Message You By Paul Wagenseil published 15 October 13 Twitter adds an optional feature to let followers direct-message Twitter users. Previously, only users who followed each other could do so.
Mobile Security Guide: Everything You Need to Know By Tom's Guide Staff, David Eitelbach published 10 October 13 Ready to make the jump to a smartphone but worried about the risks? Here's how to keep your iPhone or Android phone secure.
7 Tips for When Your Email Account Is Hacked By Linda Rosencrance published 1 October 13 Despite your best efforts, your email account has been hacked. Now what do you do? Here are 7 steps to keep you and your contacts safe.
How to Enable Android Device Manager Security By Marshall Honorof published 30 September 13 If you have a recent Android phone, then you have access to the Android Device Manager security feature — although you might not know it.
How to Spot (and Stop) ATM Skimmers By Linda Rosencrance published 27 September 13 Crooks are smart about installing ATM skimmers to steal your card data. But you can still protect yourself. Here’s how to tell whether an ATMs has any illicit add-ons.
How to Turn Your Old iPhone Into a Security Camera By Michael Andronico published 24 September 13 No longer using your old iPhone 4, 4s or 5? You can turn that Apple smartphone into a security camera with a few simple steps. Here's how.
Beat the FBI: How to Send Anonymous Email Without Getting Caught By Ben Weitzenkorn published 16 September 13 Anonymity is never certain, but you can stack the odds in your favor.
The Private NSA: See What Acxiom Knows About You By Jill Scharr published 10 September 13 Online information broker Acxiom has a profile on you. Here's how to check it out.
Parental Monitoring: How Much Is Too Much? By John R. Quain published 7 November 12 A new crop of security services promises to help parents thwart everything from cyberbullies to would-be predators. How far should you go?