• News
    • All News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Best Picks
    • All Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Reviews
    • All Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • How-To
    • All How Tos
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
  • TechHive
    • TechHive Home
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
  • More
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • Monitors
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
  • Client Content
    • BrandPosts
    • The 1Password Guide to Password Managers
    • The Avast Online Security Buyer’s Guide
    • The Dell 2026 buying guide: Laptops, monitors and Alienware gaming gear
    • The 2026 ECOVACS Robot Vacuum & Window Robot Buying Guide
    • The GIGABYTE Guide to AI Gaming Laptops
    • The MSI Cubi Mini PC Buyer’s Guide
    • The Norton Security Buyer’s Guide
    • The Norton Small Business Security Buyer’s Guide
    • The ROG Custom Gaming Keyboard Buyer’s Guide
    • The T-Mobile 5G and Fiber Home Internet Buying Guide
    • The ZOTAC GAMING Graphics Card & MEK PC Buyer’s Guide
Skip to content
  • Menu
    • All News
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
    • All Best Picks
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
    • All Reviews
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
    • All How Tos
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Laptops
    • Mobile
    • Monitors
    • PCs & Components
    • Security
    • Smart Home Security
    • Software
    • Storage
    • Streaming
    • Wi-Fi & Networks
    • Windows
  • Deals
  • Laptops
  • Windows
  • Security
    • TechHive Home
    • Smart Home Security
    • Streaming
    • Cord-Cutter Confidential
    • Accessories
    • Business
    • Entertainment
    • Gaming
    • Mobile
    • Monitors
    • PCs & Components
    • Software
    • Storage
    • Wi-Fi & Networks
  • Newsletters
  • Digital Magazine – Subscribe
  • Digital Magazine – Info
  • Smart Answers
    • BrandPosts
    • The 1Password Guide to Password Managers
    • The Avast Online Security Buyer’s Guide
    • The Dell 2026 buying guide: Laptops, monitors and Alienware gaming gear
    • The 2026 ECOVACS Robot Vacuum & Window Robot Buying Guide
    • The GIGABYTE Guide to AI Gaming Laptops
    • The MSI Cubi Mini PC Buyer’s Guide
    • The Norton Security Buyer’s Guide
    • The Norton Small Business Security Buyer’s Guide
    • The ROG Custom Gaming Keyboard Buyer’s Guide
    • The T-Mobile 5G and Fiber Home Internet Buying Guide
    • The ZOTAC GAMING Graphics Card & MEK PC Buyer’s Guide
  • Hot Topics
  • Best laptops
  • Best VPN
  • Best antivirus
  • Best SSDs
  • Best monitors
  • Laptop deals
  • Desktop PC deals
  • AI PCs
  • Newsletters

Latest Security How-To Stories

SEE SECURITY STORIES BY CATEGORY

  • Security
  • Security News
  • Security Best Picks
  • Security Reviews
  • Security How-To
More
    This free tool checks if a link is safe in seconds
    Tip

    This free tool checks if a link is safe in seconds

    With the online service URL Void, you can check whether a website is dangerous. Simply enter the URL, run a scan, and review the results from various security sources.
    By Arne Arnold 5 days ago
    How to spot and stop everyday cyberattacks
    How-To

    How to spot and stop everyday cyberattacks

    It never stops. Attackers continue to exploit new vulnerabilities and tricks to hack accounts or infiltrate devices. To stay protected, you should be aware of the latest hacks.
    By Arne Arnold 1 month ago
    Is that $20 credit for the Verizon outage real? Don’t click a bad link
    Tip

    Is that $20 credit for the Verizon outage real? Don’t click a bad link

    Yes, Verizon is issuing $20 credits for last week’s outage. And scammers want you to use their fake links instead.
    By Alaina Yee 1 month ago
    Is a hacker logged into your Google account? Here's how to find out
    How-To

    Is a hacker logged into your Google account? Here's how to find out

    If someone’s lurking within your email, photos, and other files, you can boot them.
    By Alaina Yee 1 month ago
    At last! California residents can block data brokers selling personal info
    How-To

    At last! California residents can block data brokers selling personal info

    Don’t live in CA? This still could result in good news for you down the road.
    By Alaina Yee 2 months ago
    How to use your security camera's 2-way audio (without being weird about it)
    How-To

    How to use your security camera's 2-way audio (without being weird about it)

    Being able to speak to the people on the other end of those connections is indispensable to my home security.
    By Michael Ansaldo 3 months ago
    You should never, ever delete your spam email. Here's why
    Feature

    You should never, ever delete your spam email. Here's why

    Instead of deleting spam emails, you should consider marking them, which teaches the spam filter to better recognize and catch unwanted emails.
    By Steffen Zellfelder 3 months ago
    Hacked email? How to protect your account before attackers take over
    How-To

    Hacked email? How to protect your account before attackers take over

    These steps will show you what to do in the event of a hacked email account and which support centers are available to you.
    By Florian Kastner 3 months ago
    Beware! How AI is writing phishing emails that look real
    How-To

    Beware! How AI is writing phishing emails that look real

    Criminals are increasingly using AI tools to perfect their phishing emails and even attaching PC viruses.
    By Roland Freist 4 months ago
    One simple question can stop a deepfake scammer immediately
    Tip

    One simple question can stop a deepfake scammer immediately

    Deepfake technology has improved so much that you could mistake an imposter for the real person. But this expert tip will catch a fraudster in the act.
    By Alaina Yee 4 months ago
    I was robbed. Then I turned my home into a smart security fortress for $400
    How-To

    I was robbed. Then I turned my home into a smart security fortress for $400

    A brazen theft was the wake-up call. I turned my house into a fortress with security cameras, sensors, and even protection from fire and water damage.
    By Christoph Hoffmann 4 months ago
    Ring's AI-powered pet finder is coming—and you're already signed up
    How-To

    Ring's AI-powered pet finder is coming—and you're already signed up

    Ring’s new AI-enabled Search Party feature enlists the help of nearby Ring cameras—including yours, unless you say otherwise—to spot missing pets.
    By Ben Patterson 4 months ago
    Zoom isn't as private as you think. Here's how to lock it down
    How-To

    Zoom isn't as private as you think. Here's how to lock it down

    Keep your online meetings and the data shared in them more private and secure with these tips.
    By Jon Martindale 5 months ago
    Worried about hackers, viruses, and fraud? Ask yourself these 10 questions
    How-To

    Worried about hackers, viruses, and fraud? Ask yourself these 10 questions

    New attacks, new security technologies, new questions: In this article, we provide answers to current problems in PC and internet security.
    By Arne Arnold 5 months ago
    Ring lets police ask for security videos. Here’s how to opt out
    How-To

    Ring lets police ask for security videos. Here’s how to opt out

    A feature in Ring’s Neighbors app allows law enforcement to request footage from your Ring cameras. You don’t have to play ball.
    By Ben Patterson 5 months ago
    Is that virus warning real? How to spot false alarms
    How-To

    Is that virus warning real? How to spot false alarms

    When an antivirus program sounds the alarm, it always triggers a moment of shock in the user. But the warning is not always justified. Because even a virus scanner can make mistakes.
    By Roland Freist 5 months ago
    How to set up recovery methods in RoboForm
    How-To

    How to set up recovery methods in RoboForm

    It takes just a few minutes to avoid a headache later.
    By Alaina Yee 5 months ago
    How to set up a passkey for your Microsoft account
    How-To

    How to set up a passkey for your Microsoft account

    Microsoft wants people to use passkeys for login across Windows and other devices—so the process is simple.
    By Alaina Yee 5 months ago
    Make Chrome safer against scam sites by flipping on this AI feature
    Tip

    Make Chrome safer against scam sites by flipping on this AI feature

    Chrome's Enhanced Safe Browsing feature now uses AI to recognize online threats as they surface.
    By Roland Freist 5 months ago
    Don't get locked out of Dashlane! Here's how to set up recovery methods
    How-To

    Don't get locked out of Dashlane! Here's how to set up recovery methods

    It takes 10 minutes max, and you’ll avoid a huge headache if you ever forget your password or lose access to your 2FA methods.
    By Alaina Yee 5 months ago
    1 2 3 4 5 … 14 Next
    PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
      • Privacy Policy
      • Cookie Policy
      • Terms of Service
      • Copyright Notice
      • European Privacy Settings
      • Member Preferences
      • Editorial independence
      • Licensing & Eprints
      • California: Do not Sell my Personal Info
      • About Us
      • Advertise
      • Ad Choice
      • Contact Us
      • Foundry Careers
      • GamePro
      • Smart Answers
      • Business

        Laptop

        Mobile

        PC Hardware

        Storage

        Deals

        TechHive

      • Digital Magazine - Subscribe

        Digital Magazine - Info

        Gift Subscription

        Newsletters

    © 2026 FoundryCo, Inc.
    Top Of Page