How to Manually Disable Windows Defender in Windows 10 Home
Want to disable Windows Defender in Windows 10 Home without messing with the registry? Here's how to do that!
How to Use a USB Key to Deal With Security Threats
Aren't USB flash drives redundant? We don't think so. There are many ways in which a USB drive can still come in handy, including keeping your computer secure. Here's how.
Beware These 8 Security Issues When Recycling Hardware
Recycling old hardware is a good idea, but you don't want to give away personal data. Consider these security concerns before getting rid of your hardware, and see what you can do about them.
How to Tweak Windows XP and Stop Worrying About the Apocalypse
Are you forced to stay with Windows XP? Using an unsupported operating system is risky, but don't despair! We show you how you can carry on running Windows XP, if you must.
What Is a Bootkit, and Is Nemesis a Genuine Threat?
Hackers continue to find ways to disrupt your system, such as the bootkit. Let's look at what a bootkit is, how the Nemesis variant works, and consider what you can do to stay clear.
Microsoft Edge's PDF Exploit: What You Need to Know
The new Microsoft Edge browser has introduced new problems, such as its PDF exploit. But what is it? Are you safe? And is Edge unique with these types of issues? Let's investigate.
Windows Defender Can Now Scan for Malware on Startup
Windows Defender may not be the best security solution, but Microsoft is working hard to make it relevant. Here's an update you might find worthwhile.
How to Tell if Your Computer is Vulnerable to Hackers
Do you really know how vulnerable your computer is? It can be difficult to tell, so here are three different things you can check to see just how safe you are from hackers and scammers.
5 Ways to Protect Yourself from a Zero-Day Exploit
Zero-day exploits, software vulnerabilities that are are exploited by hackers before a patch becomes available, pose a genuine threat to your data and privacy. Here is how you can keep hackers at bay.
Is Linux Really as Secure as You Think It Is?
Linux is often touted as the most secure operating system you can get your hands onto, but is this really the case? Let's take a look at different aspects of Linux computer security.
Mac Users Beware: A Bug in Sparkle Could Get You Hacked
A bug in the Sparkle updater framework could result in your Mac being taken over by a hacker. Here's what you need to know.
How Dead Apps Are Drowning the Windows Store
Dead apps are everywhere in the Windows Store. Why are apps abandoned, how does it affect users, and how could Microsoft solve this dilemma? We analyze the sad state of the Windows Store.
5 Sites to Learn the History of Malware
Experience malware from the pre-Internet age. These websites will let you dig through the history of the humble computer virus.
4 Things to Consider When Buying a Security Suite
McAfee, Kaspersky, Avast, Norton, Panda - all big names in online security. But how do you decide which to choose? Here are some questions you need to ask yourself when purchasing anti-virus software.
6 Online Security Tips for Travelers and Road Warriors
Whether you're traveling for business or pleasure, Wi-Fi networks, different online privacy laws, and physical dangers to your hardware all combine to make travel a risky business for your personal and data security.
Here's The Only Mac Security Software You Need
For most people, OS X is fairly secure out of the box — and there are a number of programs out there that potentially do more harm than good.
Why to Upgrade Windows at the End of Extended Support
Eventually, support for every Windows version expires, leaving PCs full of holes, entry points for malware, and opportunities for hackers. Windows 8 recently reached end of support status - we show you why and how to upgrade.
Readers' Windows Tech Support Scam Stories
The Windows Tech Support scam prevails. Little can be done to counter it, except to hang up. We have collected stories from our readers who engaged the scammers and their tales are obnoxious.
10 Great Security Tools You Should Be Using
You can never be too careful out there in the wild west that we like to call the Internet, so using free and low cost security tools is a good idea. The following are recommended.