Computer & Internet Security

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.

Learn More / Page 2

And the FBI already has said it’ll help other law enforcement agencies with locked phones.

By John Donovan

Whether you applaud their Robin Hood-style ideology of championing free speech or detest their reckless disregard for the consequences of their actions, it’s undeniable that Anonymous has become a force to be reckoned with in recent years. From hacking politicians’ emails to taking down government websites, many of the group’s actions seem to straddle the line […] The post 9 Things Everyone Should Know About The Hacktivist Group Anonymous appeared first on Goliath.

By Wes Walcott

Google attributed some unflattering changes in a Ukrainian newspaper's Russian translation to machine error. But some security experts say that's impossible.

By Dave Roos

Advertisement

As these devices are finally made legal in California, here comes another worry: Their Bluetooth connection can be exploited.

By Dave Roos

The short answer is yes. The long answer? Some people do it for mischief, others for criminal purpose, and even governments are in on the game.

By Chris Opfer

Online harassment seems to know no bounds, with new opportunities for meanness evolving all the time. Ever heard of dogpiling or doxing?

By Alia Hoyt

Remember that crazy video you made with your friends years ago? Yes, you do, but you also wish it wasn't the first thing that pops up in a Google search of your name. Well, rejoice! There's a way to get it out of Google.

By Beth Brindle

Advertisement

Do you know what you're doing when you're "dropping dox" on somebody? It's called "doxxing," and while it's technically not illegal, it's probably not a very nice thing to do to someone.

By Beth Brindle

CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits?

By Bernadette Johnson

You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives?

By Nathan Chandler

The entertainment industry has tried to stop people from making digital copies of its work, but in 2011, they enlisted the help of the U.S. government. What is the Stop Online Piracy Act and what would it achieve?

By Jonathan Strickland

Advertisement

There are some computer programs that can monitor your Internet viewing habits for commercial purposes. Learn how you can remove adware from your computer in this article.

By HowStuffWorks.com Contributors

Tracking copyrighted files online is a tricky business, but cutting-edge software has learned to recognize data unique to music and movie clips. You're also leaving digital traces of yourself all over the internet. How are these two things related?

By Wesley Fenlon

No one should think of surfing the Internet without some kind of anti-virus software protection. Learn if there is any free anti-virus software in this article.

By HowStuffWorks.com Contributors

In 2009, President Barack Obama created a White House position -- the cybersecurity czar -- to oversee the nation's computer network safety. With so many other federal agencies focused on the same task, what exactly does the cybersecurity czar's job entail?

By John Kelly

Advertisement

Millions of people around the world have personal profiles on social networking sites. But when those people pass away, what happens to all that personal information they put online?

By Jonathan Strickland

What does it take to cripple a nation? Someone with solid computer skills, for a start. Nefarious hackers wield a lot of power with a few keystrokes, and the United States is taking action.

By Cristen Conger

We all get spam e-mail messages that tell us to follow a link. But that link could download a Trojan horse. What is it, and how is it different from a virus?

By John Fuller

Sometimes it seems like no matter what Internet community you join, someone's trying to drive you crazy. Are they just annoying, or are they doing it on purpose?

By Jonathan Strickland

Advertisement

Hackers can disable digital infrastructure in minutes. Is it only a matter of time before countries attack one another's computers? Or have they already started?

By Jonathan Strickland

You can get some great deals on online auction sites. But do you know where the items originally came from? You might be buying from an eFence.

By John Fuller

Most computer-savvy people know about viruses and how to prevent an infection. But what are some of the most destructive viruses of all time, the record-smasher server-crashers?

By Jonathan Strickland

People traveling to the United States have grown accustomed to tight security. But can the government really take your laptop and keep it indefinitely?

By Jonathan Strickland

Advertisement

Information technology and trade laws interact to let us purchase goods from faraway companies safely. Learn about information technology and trade laws.

By John Fuller

Could your e-mail be used against you in a court of law? Maybe. Computer forensics searches, preserves and analyzes information on computer systems for potential evidence in a trial.

By Jonathan Strickland