It’s no surprise that Facebook stores an immense amount of data about you. Some of that information comes directly from other companies you interact with online. Here’s how to see which companies upload your off-Facebook acti…
You’ve probably heard that public Wi-Fi is dangerous. Advice about avoiding it is almost as widespread as public Wi-Fi itself. Some of this advice is outdated, and public Wi-Fi is safer than it used to be. But there are stil…
Avast is collecting its users’ browsing histories and selling the data to third parties, according to a joint investigation by PCMag and Motherboard. This is just the latest example of free antivirus software harvesting data….
Unlike other types of malware, you can’t just clean up ransomware and go on with your day. A run-of-the-mill virus won’t destroy all your data and backups. That’s why ransomware is a hazard you need to prepare for in advanc…
You’re probably familiar with email-based phishing, where a scammer emails you and tries to extract sensitive information like your credit card details or social security number. “Smishing” is SMS-based phishing—scam text m…
The Secure Folder is a useful feature on Samsung devices that allows you to keep apps and files out of sight. Here’s how to enable it and use it.
Following reports of bad actors gaining access to people’s Ring doorbell and security cameras, you might be interested in beefing up your account’s defenses. The easiest way to do this is to change your password and set up tw…
To maintain your cybersecurity, it’s a good idea to change your computer’s password every once in a while. Windows 10 makes this easier because you can set a password expiration date.
Unlike the email spam of the late 90s and early 2000s, Facebook’s scams can be harder to spot. They hide in plain sight and recycle old tactics while preying on some of the most trusting members of society….
Password managers make it easy to use strong, unique passwords everywhere. That’s one significant benefit to using them, but there’s another: Your password manager helps protect you from imposter websites trying to “phish” yo…
Your iPhone isn’t as susceptible to viruses as a PC or Mac, but iOS malware does exist. Here’s what protects your iPhone from viruses, and how you can avoid other types of malware and threats on your iPhone or iPad….
All day, strange foreign numbers have called your phone. They’re from a country you’ve never visited. Each time the digits change slightly, making it impossible to block them. They ring for just a few seconds before hangi…
If you’re worried someone has access to your Slack account, or you want to make sure old devices are no longer logged in, you can log every device out of your account at once. Here’s how to make that happen….
Two-factor authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and LinkedIn is no exception. Here’s how to enable it and make yourself safer….
If you’re worried someone has access to your Twitter account, or you want to make sure old devices are no longer logged in, you can log every device out of your account at once. Here’s how to make that happen….
Thousands of Disney+ accounts have been “hacked” and are for sale online. Criminals are selling login details for compromised accounts from between $3 and $11. Here’s how it likely happened—and how you can protect your Disn…
Microsoft’s OneDrive cloud storage service now includes a “Personal Vault” for your sensitive files. These files are encrypted and protected with additional two-factor verification, even when they’re synced to your Windows 10…
Companies like Microsoft, Google, and Mozilla are pushing forward with DNS over HTTPS (DoH). This technology will encrypt DNS lookups, improving online privacy and security. But it’s controversial: Comcast is lobbying against…
There’s a good chance you spend more time interacting with the online world on your smartphone than any other device. Let’s take a look at how you can up your iPhone and iPad security game.
Many people have reported getting notices from their internet service providers after downloading files using torrents. How does your ISP know? It’s all in how BitTorrent works. BitTorrent is a lot less anonymous than it migh…
We recommend using a password manager like 1Password, LastPass, or Bitwarden. But modern web browsers have built-in password managers, so why install a different one? There are many good reasons to avoid your web browser’s bu…
When you use LinkedIn, it’s all about who you know. However, to import contacts, you normally have to permit the service to access your email and give up some privacy. Here’s how to export your contacts as a CSV file and th…
Can you block or slow BitTorrent traffic on your router? It’s a question we’ve gotten many times. Someone else using BitTorrent on your network can slow down your connection and even open you to lawsuits. Unfortunately, there…
Face Unlock is one of the Google Pixel 4 and Pixel 4 XL’s flagship features. But if the facial recognition is a form of biometric security you’re uncomfortable with, you can delete your face data right off the phone. Here’s h…
If you use LastPass, you should take the Security Challenge. It will scan your vault for compromised, weak, reused, and old passwords and recommend passwords you should change. LastPass will give you a numerical security scor…