Don't-Miss Security Stories
The government may soon allow your ISP to sell your browsing data. Here's how to fight back.
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Dealing with passwords will probably never be painless, but you can at least simply the process.
You can set your Android phone to unlock itself when it's in your pocket, while you're near a certain location, when it hears your voice, and more.
You don't necessarily have to spend money, but free VPN apps come with some drawbacks.
If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC.
We'll show you how to protect your online privacy as governments around the world, including the U.S., step up their online surveillance efforts.
Don't let your smart clock expose you to hackers. A web app from BullGuard can help.
After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups
CSO Online's Steve Ragan infects a laptop with Locky Ransomware
A trusted virtual private network is a great tool for security and privacy, but if it's not configured correctly it may not be so private.
Facebook's new encrypted messaging feature, Secret Conversations, is now live for everyone on Android and iOS.
Windows Defender in the Anniversary Update loves to tell you what it's doing. Here's how to stop that.
Goodbye, product key; hello, digital license. Learn more about the changes here.
Sure, you can remove your password from your Windows 10 PC, as long as it's in a very safe place. Here's how.
The Express settings option will make your installation go faster, but you might inadvertently agree to conditions you wouldn't choose for yourself.
Here's how to get started with BitLocker, the encryption tool Microsoft built right into many versions of Windows.
LastPass just patched a major security flaw that allowed an attacker to remotely compromise an account. Here's how to make sure you're not vulnerable.
Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.
No one really likes two-step verification. It's annoying. And yes, it can be hacked. But you're still far safer with it than without it.
Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.