Computer & Internet Security

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.


Learn More

Do You Need to Install Every Windows Update?

It may seem like you get endless alerts to update your Microsoft Windows system and you might be tempted to skip a few updates. Is there any harm in doing that?

Have You Been Zoom Bombed? Here's How to Stop It

Zoom bombing – when intruders hijack your videoconference calls or virtual learning sessions – has become a big deal. But how do you stop it?

What Does Browsing in Incognito Mode Really Do?

What really happens when you transfer your browser to the incognito feature? You may think you're completely anonymous on the internet but that's not what's happening. Still it does have some useful purposes.

Private Browsers Aren't All Equally Private

Even if you use the "incognito" setting on your browser, your personal and search data are still being collected at an alarming rate. Private search engines and browsers aim to lessen your digital footprint.

Can the Government See Which Websites I Visit?

To what extent is U.S. intelligence able to conduct surveillance on the internet activity and electronic communications of U.S. citizens?

Why Am I Getting So Many Privacy Policy Update Emails?

Data privacy concerns have prompted some new laws to go into effect in the European Union — and that means changes for consumers in the rest of the world too.

HowStuffWorks Illustrated: What Is Blockchain?

HowStuffWorks explains how blockchain technology, which relies upon a shared record of transactions across a peer-to-peer network of computers, is taking over the world.

Guarding Your Network Against Russian Hackers

The U.S. and U.K. issued a joint alert warning that Russian hackers have been targeting devices that help us connect to the internet. Is your digital information at risk?

Blockchain Technology Ready to Disrupt the World

It's the technology behind the meteorically rising bitcoin, and it could be really, really big.

Can You Really Delete Your Internet History?

The guys at Stuff They Don't Want You To Know talk about whether you can really delete your internet history — and why you want to.

Companies Are Figuring Out How to Turn the Tables on Hackers

Active defense techniques are changing how companies fight back against cybercrooks.

2016 Broke the Record for Stolen Data

2016 was memorable for a whole lot of reasons, and one of them was the massive amount of data stolen.

Alexa, Buy a Dollhouse!

It’s sweet to have a personal assistant like Amazon’s Alexa do your bidding. Except when it does something you didn’t anticipate, like order an adorable dollhouse.

A Storm Is Brewing: The Trouble of Malware in the Cloud

Malicious software is threatening the safety of some major cloud hosting services. Here's what a team of researchers is doing to help kick the bad guys out.

Passwords Sent Securely Through Your Body, Not the Air

To thwart hackers from intercepting wireless signals, engineers send a signal through the body, from a smartphone fingerprint scanner to a 'smart lock.'

We Just Got Closer to Creating Unbreakable Quantum Enigma Machines

Researchers have developed experimental versions of a device that could send encrypted messages impossible to intercept or decipher.

Sauron's Spies Are Everywhere — Even on Computers

Cybersecurity experts recently discovered an insidiously clever piece of malware that went unnoticed for half a decade. The name? ProjectSauron.

Hackers Turn Computer Fans Into Snitches

You know how you can't really disconnect your PC's fan unless you want a hot mess on your hands? Turns out that fan could serve a more nefarious purpose, too.

Inside the Troll: The Science of Being an Awful Person

Trolls are everywhere these days, driving people off Twitter and wreaking havoc online. They also have specific personality traits that the general population doesn't.

How the FBI Cracked the iPhone Case … With a Little Help From Outside

And the FBI already has said it’ll help other law enforcement agencies with locked phones.

The Land of Mordor? How Hackers and Spies Use Google Translate

Google attributed some unflattering changes in a Ukrainian newspaper's Russian translation to machine error. But some security experts say that's impossible.

The Closest Thing to a Real Hoverboard: Electric Skateboards Get Legal, Hacked

As these devices are finally made legal in California, here comes another worry: Their Bluetooth connection can be exploited.