The best surge protector in the world is less than $20 on Amazon By Maren Estrada

It’s easy to forget just how important surge protectors are. It’s not just about adding more outlets to a room, it’s about protecting ...

5 computer security secrets you need to know By Kevin Downey

You may have recently heard conflicting reports about ID fraud, and whether you should be concerned about it or not. You should. The threat...

No Place for a Child or Pet by Costco

Windows XP somehow just got LESS secure By Justin Ferris

It's been 16 months since Microsoft stopped rolling out security updates for the 14-year-old Windows XP and left it to the mercy of ha...

The 3 worst companies at protecting your data by Kim Komando

The EFF judged companies based on 5 basic criteria: Follows Industry Accepted Best Practices, Tells Users About Government Data Demands, D...

One thing every iPhone user must do in case of emergency by Kim Komando

Keeping your iPhone safe seems like a given. I've told you about the hundreds of apps and sites you can use to protect your electronic ...

Five Simple Steps to Protect Corporate Data What companies should be doing to protect their computer systems—but aren’t by Danny Yadron

Maybe stopping hackers isn’t always that hard. That may be difficult to imagine if you follow the headlines. In late 2013, America entered t...

Spot and avoid a dangerous phone tech support scam by Kim Komando

I recently got an email from Lynn in Valrico, FL, describing an odd experience she had on the phone. I wanted to share it with you and brin...

Report: 1 in 5 Android Apps Is Malware by Dan Tynan

Bad news, phandroids. Android malware is on the rise. According to Symantec’s latest Internet Security Threat Report, “17 percent of all An...

Information regarding an issue with the signature file in Panda Cloud Office Protection and Retail 2015 by Marta Lopez

We inform you that we have had an incident with our signature file that might have affected our Panda Cloud Office Protection and Retail 2...

This free anti-virus software actually wrecks computers by Kim Kommando

Photo courtesy of Shutterstock What do you think about this?   Not all security software is created equal. In fact, the...

Stop Facebook from tracking everywhere you go online by Kim Komando

It's no secret that Facebook is using your information to build its huge financial empire. Partly it does this by sharing your informat...

How to uninstall MacKeeper from your Mac by Christopher Breen

Reader Michael Downend is having difficulty ridding his Mac of a utility he no longer desires. He writes: How do I get rid of MacKeeper? I w...

5 ways hackers attack you and how to beat them by Kim Komando

Right now, millions of hackers, spammers and scammers are hard at work. They're after your Social Security number, bank account inform...

Warning: You hit a malware site by Kim Komando

Hackers love phishing. Whether it's through email, texts or on social media, chances are sooner Click here to learn how to spot and avo...

Our Collective Mobile Security Blind Spot by Jason Ankeny

Jose Quintero knows all too well how much havoc a lost smartphone can wreak on a business. Years before he became director of information...