Computer Security Systems

Computer security is an increasingly important consideration. From authentication to encryption keys, learn how to keep your computer's hard drive protected and your personal information safe.

Topics to Explore


Learn More / Page 2

The Closest Thing to a Real Hoverboard: Electric Skateboards Get Legal, Hacked

As these devices are finally made legal in California, here comes another worry: Their Bluetooth connection can be exploited.

Can you hack a drone?

The short answer is yes. The long answer? Some people do it for mischief, others for criminal purpose, and even governments are in on the game.

How could an algorithm spot trolls on the Internet?

If you've spent any time online, you've probably run into someone who seems to want nothing more than to stir up trouble and make others miserable. What if a program could find and weed out these trolls?

10 Forms of Online Harassment

Online harassment seems to know no bounds, with new opportunities for meanness evolving all the time. Ever heard of dogpiling or doxing?

How can Google forget you?

Remember that crazy video you made with your friends years ago? Yes, you do, but you also wish it wasn't the first thing that pops up in a Google search of your name. Well, rejoice! There's a way to get it out of Google.

What is doxxing?

Do you know what you're doing when you're "dropping dox" on somebody? It's called "doxxing," and while it's technically not illegal, it's probably not a very nice thing to do to someone.

Exactly what is a zero-day vulnerability?

Viruses. Malware. Spyware. Add to the seemingly ever-growing list of things we have to worry about when dealing with computers one more factor: zero-day vulnerability. So just what the heck is it, and how does it put us at risk?

Is the Chinese army hacking American computers?

After attacks on U.S. companies, government entities and news organizations, a cybersecurity firm traced the hacks back to a single 12-story building on the outskirts of Shanghai. Why does this location raise more questions than answers?

How CISPA Works

CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits?

How Anonymous Works

You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives?

How Protect IP Works

The Protect IP Act has the seemingly simple and noble goal of stopping electronic piracy. But its foes say the bill is fundamentally flawed. What would the new law do and how would it work?

How SOPA Works

The entertainment industry has tried to stop people from making digital copies of its work, but in 2011, they enlisted the help of the U.S. government. What is the Stop Online Piracy Act and what would it achieve?

How do you remove adware from your computer?

There are some computer programs that can monitor your Internet viewing habits for commercial purposes. Learn how you can remove adware from your computer in this article.

How Digital Fingerprinting Works

Tracking copyrighted files online is a tricky business, but cutting-edge software has learned to recognize data unique to music and movie clips. You're also leaving digital traces of yourself all over the internet. How are these two things related?

Is there any free anti-virus software?

No one should think of surfing the Internet without some kind of anti-virus software protection. Learn if there is any free anti-virus software in this article.

Hacking and Computer Pictures

Hacking has become a more common problem, and the risk of identity theft is always increasing. Hackers have become infamous for their viruses and their ability to outsmart our password-protected secrets. Take a look at these hacking and computer pictures.

What does the U.S. cybersecurity czar do?

In 2009, President Barack Obama created a White House position -- the cybersecurity czar -- to oversee the nation's computer network safety. With so many other federal agencies focused on the same task, what exactly does the cybersecurity czar's job entail?

How will biometrics affect our privacy?

Biometrics provide a unique method of security that's virtually foolproof. Just scan a fingerprint or your retina and you're in. But what could happen if your personal information were stolen?

What happens to all my social networking information when I die?

Millions of people around the world have personal profiles on social networking sites. But when those people pass away, what happens to all that personal information they put online?

Could a single hacker crash a country's network?

What does it take to cripple a nation? Someone with solid computer skills, for a start. Nefarious hackers wield a lot of power with a few keystrokes, and the United States is taking action.

How Trojan Horses Work

We all get spam e-mail messages that tell us to follow a link. But that link could download a Trojan horse. What is it, and how is it different from a virus?

Can someone force you to visit Web sites against your will?

Where you go on the Web is your own business. Without an administrator's password, no one should be able to take control of your computer. At least, that's what you've been told.

How Trolls Work

Sometimes it seems like no matter what Internet community you join, someone's trying to drive you crazy. Are they just annoying, or are they doing it on purpose?

Is cyberwar coming?

Hackers can disable digital infrastructure in minutes. Is it only a matter of time before countries attack one another's computers? Or have they already started?

How eFencing Works

You can get some great deals on online auction sites. But do you know where the items originally came from? You might be buying from an eFence.