Experts we spoke to had surprisingly similar opinions about the allegations that Kaspersky Lab may have spied for the Russian government.
Paid antivirus products, with their more elaborate system behavior monitors, are more likely to pick up on new threats. That's the difference.
Why can't we vote online? You might be surprised, but many computer-security and electronic-ballot experts are dead set against the idea.
Where do Donald Trump and Hillary Clinton stand on online privacy, information security, encryption and other technological concerns?
We've all heard how insecure connected cars can be, yet few people are willing to fix any of it. Enter I Am the Cavalry.
Exaggerated media reports about data breaches may scare people away from thinking they can improve their own personal security habits.
Java may be among the most insecure pieces of software on any computer, and most of us have little reason to run it.
Does OS X Mavericks address Apple's half-hearted approach to desktop security? Or does it not go far enough?
Scammers always have new ways to separate your money from your brain. Here are six come-ons, deals and unbeatable offers you should avoid.
While leaving your Android phone's well-being to a specialized app has its advantages, you can get by with just a little know-how, instead.
As the proliferation of smart devices begins in earnest, consumers may invite a whole new wave of security risks into their homes.
Your smartphone is probably a much more tempting target for cybercriminals than your desktop computer.
The "black budget" leaked by Edward Snowden mentions the NSA's focus on researching "groundbreaking cryptanalytic capabilities." What does that mean?
Logging into third-party websites using your Facebook credentials is convenient -- but it gives your personal data to sites that may not be secure.
Apple is one of the companies implicated in the National Security Agency's data-mining PRISM operation. If you use iCloud, your online storage may be at risk, but you can protect your files.
Unlike other organizations implicated by the National Security Agency's invasive PRISM program, Microsoft may have been a willing participant. Use caution with its SkyDrive cloud storage service.
Dropbox may be the next target of the government's invasive PRISM program, which means that it's more imperative than ever to learn how to safeguard whatever files you have stored there.
Between the National Security Agency (NSA) and Google's own overreaching terms of service, your files on Google Drive may be open to snooping from both organizations. What are the risks and how can you minimize them?