We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
Windows Security Apple Android Smartphones Tablets Software Laptops Broadband Gadgets Games
Digital Home Audio Photo & Video Printing Components Desktop PCs Peripherals PC Upgrades Linux SMB Tech Enterprise
Social Networks Tech Industry Internet 3D Storage
2,793 Tutorials

Latest Security How-To

  • How-Tos: Take precautions when using Gmail--or any other email service

    G. Jitchaku asked me if Gmail was "safe." That's a very broad question, so I'm offering a very broad answer.

  • How-Tos: How to achieve better third-party security: Let us count the ways

    No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.

  • How-Tos: How to protect yourself against privileged user abuse

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • How-Tos: Five questions to answer before paying for a VPN

    If you work on a computer or mobile device away from home, you probably use Wi-Fi hotspots in hotels, cafés, restaurants, airports, or on campus. The problem is, there is no way to know exactly how secure those networks are.

  • How-Tos: Top 10 fixes for common PC problems: The best of PCWorld's Answer Line

    I've been answering questions from PCWorld readers since 1997, and I think I've read about every problem that Windows and PC hardware can provide.

  • How-Tos: Six ways to prevent a breach like the one at AT&T

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • How-Tos: You've fallen for a scam! Now what?

    Cybercriminals tricked Fred into giving away sensitive information. Now he wants to know how "to mitigate this situation?"

  • How-Tos: How to remove malware

    How to remove malware from your PC. Get rid of virus, spyware from your PC or laptop. Clean up any PC or laptop.

  • How-Tos: How to protect your PC from GOZeuS and Cryptolocker

    The UK’s National Crime Agency along with the FBI, Europol and various tech firms have worked together to temporarily pause the attacks from the Cryptolocker and GOZeus malware. Here’s what you need to know about keeping your PC and data safe.

  • How-Tos: Microsoft phone scam: don't be a victim

    If you receive a phone call from a security 'expert' offering to fix your PC - it's a scam. Here's how to avoid the Microsoft phone scam, and what to do if you fear you have fallen victim to it.

  • How-Tos: How to deactivate or delete your Facebook account

    If you're fed up with Facebook, you might decide that you want to delete your account. You can choose to temporarily delete your Facebook account or permanently delete your Facebook account, depending on your reasons for leaving. Here, we guide you through both options.

  • How-Tos: How to send secure messages and encrypted emails

    We explain how to send sensitive information via email and messenger app. How to send secure emails, how to send secure messages.

  • How-Tos: How to change your eBay password

    eBay has been in the news this week following confirmation that its database containing encrypted passwords and other data has been hacked. To protect your eBay account you need to reset your password; here's how to change your eBay password.

  • How-Tos: Get two-factor authentication on the desktop with Authy

    One of the best security precautions you can take to protect your online accounts is to enable two-factor authentication on any service that supports it. This requires you to enter a short, one-time code to access your online accounts after you've entered your password.

  • How-Tos: How to set up a VPN

    You can use a VPN to stay safe, secure and anonymous online as well as to pretend you're in a different country - useful if you want to access otherwise blocked websites and services. Here we show you how to use the free Hotspot Shield in Windows and SurfEasy for Android.

  • How-Tos: How to remove unwanted browser toolbars

    We show you how to disable and delete those unwanted and annoying web browser toolbars, including Snap.do, however they got onto your PC or laptop.Updated: 9th May 2014

  • How-Tos: How to create a strong password

    It's easy to be lazy and use the same password for every online account but using these simple techniques, you'll be able to remember strong passwords for different websites. Updated 1st May 2014

  • How-Tos: How to defend against the OpenSSL Heartbleed flaw

    CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say.

  • How-Tos: How to use a webcam as CCTV

    Build your own surveillance system with your PC’s built-in or USB webcam. We explain how to use a webcam as a CCTV and motion detection recording system.

  • How-Tos: Create image backup of USB drive

    How to easily create exact image copies of any USB flash drives and store them on your PC or laptop. PLUS: how to quickly and easily create multiple copies of a USB flash drive.

Share this




IDG UK Sites

OnePlus Two release date rumours: Something's happening on 22 July

IDG UK Sites

13in MacBook Air review, Apple's MacBook Air 2014 reviewed

IDG UK Sites

5 reasons to buy an electric car and 5 reasons not to

IDG UK Sites

Evernote Skitch: the best way for creatives to doodle feedback