Computer & Internet Security

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.

Learn More / Page 2

Malicious software is threatening the safety of some major cloud hosting services. Here's what a team of researchers is doing to help kick the bad guys out.

By Jonathan Strickland

To thwart hackers from intercepting wireless signals, engineers send a signal through the body, from a smartphone fingerprint scanner to a 'smart lock.'

By Patrick J. Kiger

Researchers have developed experimental versions of a device that could send encrypted messages impossible to intercept or decipher.

By Patrick J. Kiger

Advertisement

Cybersecurity experts recently discovered an insidiously clever piece of malware that went unnoticed for half a decade. The name? ProjectSauron.

By Jonathan Strickland

You know how you can't really disconnect your PC's fan unless you want a hot mess on your hands? Turns out that fan could serve a more nefarious purpose, too.

By Jonathan Strickland

Trolls are everywhere these days, driving people off Twitter and wreaking havoc online. They also have specific personality traits that the general population doesn't.

By Julia Layton

And the FBI already has said it’ll help other law enforcement agencies with locked phones.

By John Donovan

Advertisement

Google attributed some unflattering changes in a Ukrainian newspaper's Russian translation to machine error. But some security experts say that's impossible.

By Dave Roos

As these devices are finally made legal in California, here comes another worry: Their Bluetooth connection can be exploited.

By Dave Roos

The short answer is yes. The long answer? Some people do it for mischief, others for criminal purpose, and even governments are in on the game.

By Chris Opfer

If you've spent any time online, you've probably run into someone who seems to want nothing more than to stir up trouble and make others miserable. What if a program could find and weed out these trolls?

By Bernadette Johnson

Advertisement

Online harassment seems to know no bounds, with new opportunities for meanness evolving all the time. Ever heard of dogpiling or doxing?

By Alia Hoyt

Remember that crazy video you made with your friends years ago? Yes, you do, but you also wish it wasn't the first thing that pops up in a Google search of your name. Well, rejoice! There's a way to get it out of Google.

By Beth Brindle

Do you know what you're doing when you're "dropping dox" on somebody? It's called "doxxing," and while it's technically not illegal, it's probably not a very nice thing to do to someone.

By Beth Brindle

Viruses. Malware. Spyware. Add to the seemingly ever-growing list of things we have to worry about when dealing with computers one more factor: zero-day vulnerability. So just what the heck is it, and how does it put us at risk?

By Beth Brindle

Advertisement

After attacks on U.S. companies, government entities and news organizations, a cybersecurity firm traced the hacks back to a single 12-story building on the outskirts of Shanghai. Why does this location raise more questions than answers?

By Laurie L. Dove

CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits?

By Bernadette Johnson

You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives?

By Nathan Chandler

The Protect IP Act has the seemingly simple and noble goal of stopping electronic piracy. But its foes say the bill is fundamentally flawed. What would the new law do and how would it work?

By Jonathan Strickland

Advertisement

The entertainment industry has tried to stop people from making digital copies of its work, but in 2011, they enlisted the help of the U.S. government. What is the Stop Online Piracy Act and what would it achieve?

By Jonathan Strickland

There are some computer programs that can monitor your Internet viewing habits for commercial purposes. Learn how you can remove adware from your computer in this article.

By HowStuffWorks.com Contributors

Tracking copyrighted files online is a tricky business, but cutting-edge software has learned to recognize data unique to music and movie clips. You're also leaving digital traces of yourself all over the internet. How are these two things related?

By Wesley Fenlon

No one should think of surfing the Internet without some kind of anti-virus software protection. Learn if there is any free anti-virus software in this article.

By HowStuffWorks.com Contributors

Advertisement

In 2009, President Barack Obama created a White House position -- the cybersecurity czar -- to oversee the nation's computer network safety. With so many other federal agencies focused on the same task, what exactly does the cybersecurity czar's job entail?

By John Kelly

Millions of people around the world have personal profiles on social networking sites. But when those people pass away, what happens to all that personal information they put online?

By Jonathan Strickland