How-Tos

internet data
data recovery ts

stormtrooper penguin

Why Linux users should worry about malware

From updates, to VPNs, to firewalls and AV, there are several steps Linux users should take to stay safe.

computer frustration man

8 tech dangers every novice can avoid with these tips

Tech novices are easy targets for malware, phishing, and sleazy salespeople. Protect the novices you know with these tips to help them be smarter about buying and using their tech devices.

video

How to recover your system from a Ransomware attack

After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups

video

What a Locky Ransomware attack looks like

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 1 billion users. Google is the safest choice for personal email.

yahoo homepage

How to replace 5 major Yahoo services and delete your Yahoo account

Yahoo users have 1 billion more reasons to switch another major hack. Here's how to replace major Yahoo services with rivals and delete your Yahoo account.

cryptolocker -ransomware - flickr

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation.

video

Google Photos tips and tricks

Google Photos has some powerful tools for tweaking and editing images. We show you how to take advantage of them to enhance and display your photos.

video

Facebook encrypted messages: Setting up Secret Conversations in Messenger

Even Facebook lets you have a little privacy, letting you send encrypted messages using the Secret Conversation feature in Facebook Messenger. Here’s how it works.

video

How to Block Ads in Windows 10

Some Windows 10 ads are pretty unobtrusive, but several get right up in your face. Here’s how to disable them with a few simple menu tweaks.

video

Facebook privacy settings: How to control your ad preferences

Facebook targets ads based on your activity. You can check--and change--what it thinks your interests are in Ad Preferences.

breach bucket

How to prepare for a data breach

Tips and tricks for preparing a data breach response plan

looking ahead spying

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

negotiating contracts ts

6 ways to add cybersecurity protections to outsourcing deals

There is growing concern about how third-party IT services providers are protecting corporate data. Here are six ways IT leaders can better negotiate cybersecurity and data privacy issues.

video

How to download and save a Facebook video

Facebook doesn’t officially provide links to videos for you to save. But all you have to do is trick your browser into thinking you’re browsing Facebook on your phone.

email thinkstock

Make your emails more trusted with DKIM

There are authentication systems -- DomainKeys and its successor DKIM -- that try to mitigate some of the risk of trusting that emails are actually from who they say they are from.

ecommerce woes2

7 ways to protect your ecommerce site from fraud, hacking and copycats

Ecommerce business owners and cybersecurity experts discuss how you can protect your online store, especially during the holiday season.

video

How to Get Windows XP's Quick Launch Bar In Windows 10

The beloved Quick Launch Bar from Windows XP lives on in Windows 10, providing easy access to specific folders and files from the taskbar. Here’s how to get it.

Load More