Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.
Security: Buying Advice, Tips, and News

Latest Security Stories

More than ever, the Olympic Games are a 'high-stakes cyberthreat target,' according to a report from Fortinet that highlights the most popular scams attendees should watch out for.

By Emily Dreibelbis

The 'EvilVideo' Telegram exploit was fixed, but it's still possible to receive malicious APK files via the app thanks to its default settings.

By Kate Irwin
4.5

Small but mighty, the YubiKey 5C Nano offers a diverse range of authentication protocols that security pros will appreciate and is tiny enough to live on your computer full-time.

By Kim Key

Obsessed exes can use stalkerware to turn your phones and PCs into listening devices that report everything you do. We show you how to protect yourself.

By Kim Key

If you're short on cash, you can still use a VPN to improve your privacy online. Here's everything you need to know about what you get (and don't get) with the best free VPN services we've tested.

By Chris Stobing

Rest easy knowing that your personal information is secured when browsing online thanks to one of these award-winning VPNs. Find the one that’s right for you (at a nice discount, too).

By Jade Chung-Lee  & Karl Klockars

However, the 'two step verification' will only pop-up if someone tries to change the email address or phone number registered to an account.

By Michael Kan

While a good VPN will protect your online privacy, it almost certainly won't make your internet connection faster. Some have far less performance impact than others, however. These VPNs fare best in our speed tests.

By Chris Stobing

UK police also seize 'a number of digital devices' and say the arrest is part of an ongoing operation to hunt down a cybercriminal group targeting major companies.

By Michael Kan

Cybersecurity experts spot suspected phishing emails pretending to be customer support from CrowdStrike, the cybersecurity firm behind Friday's massive IT outage.

By Michael Kan

A faulty update from antivirus provider CrowdStrike triggers the Blue Screen of Death on numerous Windows PCs. Fortunately, there's a (slightly complicated) solution.

By Michael Kan

It may sound ridiculous, but the multiple-reboot routine on Azure servers could send a signal to CrowdStrike to apply a fix. 'Can solve itself after 3 reboots, could take 15 or more,' one admin says.

By Michael Kan

The FBI used tech from Cellebrite, which had to provide the agency with unreleased software. Had the shooter used a newer iPhone, the feds may have been out of luck, leaked documents suggest.

By Joe Hindy

YouTube live streams try to trick users into handing over cryptocurrency by using deepfake footage of Elon Musk talking about Saturday's attempted assassination of Donald Trump.

By Michael Kan

Regulators in Italy allege Google's data consent practices aren't giving users the full picture of how their personal data is being assessed to display ads.

By Kate Irwin

Are you excited about savings, security, and safety? Discounts are still available, like Black Friday in July, on top-rated security suites for protecting against unwanted pop-ups, malware, and more. 

By Shubham Yewale

The flaw can pave the way for a sophisticated hacker to spy and redirect user traffic over a vulnerable VPN server. However, several major VPN brands are immune to the threat.

By Michael Kan

The Commerce Department may soon limit Chinese software in 'connected vehicles' in the US, requiring car manufacturers to use firms in 'allied' countries for data storage instead.

By Kate Irwin

A $22 million ransom payment pales in comparison to the estimated $2.3 billion this year's ransomware incident is expected to cost the health insurance provider.

By Michael Kan
2.5

Comodo Free Antivirus includes many high-end bonus features, but independent antivirus testing labs have little to say about it, and it fares poorly in our own hands-on tests.

By Neil J. Rubenking