Latest Security How-To Stories
SEE SECURITY STORIES BY CATEGORY
How-To
4 exotic phishing scams are surging. Here's how to catch them in the act
Phishing attacks are getting more advanced by the day. To help protect yourself against them, we'll provide information about the latest tricks used by these lowly criminals.Updated
Fake AI images are flooding the Internet. Here's how to recognize them
Faking images, videos, and voice recordings has become much easier with the latest AI technology. But there are also new tools designed to recognize these fakes.How-To
Is someone spying on your Wi-Fi? How to sniff out network snoops easily
Suspiciously slow Internet or unknown devices connecting without permission? How to recognize uninvited guests on your home networkHow-To
Microsoft Edge can now block scareware, but there’s a tiny catch
Microsoft’s browser can spot fake alerts about technical issues or even a compromised PC, but it’s not automatic.Tip
This ethical hacker’s one tip changed how I think about digital scams
Just a small amount of effort has a big effect.Tip
Clear your YouTube activity history and reclaim your data privacy
Your Google account tracks the YouTube videos you've watched, liked, and commented on. Delete this data to protect your privacy.Tip
Proton VPN: The first 5 settings you need to change
These quick and easy changes will optimize your VPN experience.Tip
Getting email you didn't sign up for? Don't unsubscribe—it might be a scam
If you’re trying to rid yourself of unwanted messages, you could put yourself at risk when trying to unsubscribe from the mailing list.How-To
How to install a VPN on a Fire TV Stick
Enjoy greater privacy and the ability to unlock location-restricted content by using a VPN with your Fire TV Stick.Tip
I use this $18 box to safely plug in all my outdoor smart devices
I use power strips and multi-plug extension cords to power my outdoor smart lights, water feature pumps, barbecue, and more. This box keeps everything hidden and dry.Tip
Why using a VPN and Tor together can backfire on your privacy
VPNs and Tor both offer security, but using them together isn't always safer. Here's what you should know.Tip
This dual-power LED flashlight makes my Maglite feel like a relic
The Infinity X1 can run on either rechargeable or disposable batteries, it can charge your phone, and it will make a wicked club during the zombie apocalypse.Tip
Use this tucked-away Chrome feature to surf the web more safely
Safety has always been paramount when surfing the web. Fortunately, Chrome has a nifty feature that keeps you safe with minimal effort. Here's how to use it.How-To
Windows Defender isn't just PC antivirus. Here are all the ways it protects you
Microsoft causes confusion with its names. This is also the case with Defender device protection. The guide breaks down the differences between Windows Defender, the Defender app and Windows security.Tip
This Microsoft dev battles scams daily. Here’s the one tip he wants you to know
Out of work? This acronym helps you spot phony opportunities fast—and the principles apply to other types of fraud too.How-To
Don't get hacked! I open dubious PC files in a sandbox. You should too
Files and links that you receive could be infected with viruses. If you are ever unsure whether a file is harmless or whether a link leads to a safe website, check it in an online sandbox.How-To
Is someone spying on your Facebook account? Here's how to find out
If a hacker has secret access to your messages, posts, photos, and videos, you can kick them out.How-To
So long, passwords: 5 easy ways to use passkeys
This alternative to passwords is not only simpler, but more secure too. Here’s how to get started.How-To
How to turn a USB flash drive into a secure login key for your PC
Here's how you can turn a USB flash drive into a secure key for your PC!How-To