Fire up your Mac's firewall
A few weeks back, after the Working Mac column about scanning your Mac for viruses I received an email message from Yolanda:
Jeffery Battersby | 26 Jun | Read more
A few weeks back, after the Working Mac column about scanning your Mac for viruses I received an email message from Yolanda:
Jeffery Battersby | 26 Jun | Read more
We originally published this article about a year ago, but in light of Lenovo's Superfish fiasco, cleaning crapware off your PC is now more relevant than ever. For Superfish-specific instructions, see our handy guide here. But even if you don't own one of the affected Lenovo PCs, the following guide should still prove helpful.
Chris Hoffman | 20 Feb | Read more
Given the countless reports of our data being exploited, many of us are increasingly concerned about protecting that data. In this movie I'm going to show you how to protect a collection of data on your Mac.
Christopher Breen | 27 Nov | Read more
On the surface, the critical "Shellshock" bug revealed this week sounds devastating. By exploiting a bug in the Bash shell command line tool found in Unix-based systems, attackers can run code on your system--essentially giving them access to your system. Bad guys are already developing exploits that use Shellshock to crack your passwords and install DDoS bots on computers. And since Bash shell is borderline ubiquitous, a vast swath of devices are vulnerable to Shellshock: Macs, Linux systems, routers, web servers, "Internet of Things" gizmos, you name it.
Brad Chacos | 27 Sep | Read more
On Tuesday, BitTorrent (the company) launched Sync 1.4, a brand new version of its peer-to-peer file syncing app that makes sharing folders with others a breeze. We have an in-depth hands-on with Sync 1.4 that will teach you how to use the app if you're not familiar with it.
No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.
Taylor Armerding | 30 Jun | Read more
I've been answering questions from PCWorld readers since 1997, and I think I've read about every problem that Windows and PC hardware can provide.
Lincoln Spector | 18 Jun | Read more
A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.
Antone Gonsalves | 18 Jun | Read more
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say.
Antone Gonsalves | 10 Apr | Read more
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
Tony Bradley | 19 Feb | Read more
Even if you don't do New Year's resolutions, flipping the calendar to a fresh year is a great time to take stock of your tech habits and brush them up as needed. Unlike resolutions you have to keep all year, like working out every day, most of these technology pledges are set-it-and-forget-it. We know you're a super-smart person and you're probably doing all this stuff already, but it never hurts to double-check.
Susie Ochs | 03 Jan | Read more
When it comes to your security, the latest versions of Windows and OS X are comparable, but you still have a few key differences and settings to become familiar with.
Rich Mogull | 05 Jul | Read more
Reader Jack Burns is a bit disconcerted by some recent news. He writes:
Christopher Breen | 10 Jun | Read more
Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Kristin Burnham | 25 Apr | Read more
The Internet? Kind of a cesspool. And as the parent of kids who are now old enough to operate a Web browser, you can bet I'm keen on checking their activities and filtering out the inappropriate content.
Rick Broida | 15 Apr | Read more