Top Story

Defying Feds, MS tries to keep user data private

Microsoft is currently fighting a federal search warrant demanding that the company release emails stored in Ireland. Here’s why you should be extremely concerned by a U.S. court’s actions — and what you can do about it.

Read More »

How to solve UEFI boot and startup problems

Successor to the antiquated BIOS, the Unified Extensible Firmware Interface (UEFI) adds powerful security tools to post-XP systems. Ironically, UEFI can also block important repair, recovery, and backup tools that boot from DVDs, CDs, or USB drives.

Read More »

Chromebooks take on cheap Windows laptops

With the tide of yule rapidly approaching, I’ve been repeatedly asked about the relative merits of cheap Windows laptops, tablets — and Chromebooks. Choosing among the three platforms isn’t easy; depending on your needs, any one of them might be right.

Read More »

Help for picking your next anti-malware tool

Picking the right anti-malware app can be onerous; there are dozens to choose from, and rapidly evolving exploits are constantly putting them to the test. Fortunately, a few independent organizations such as AV-Comparatives are also testing leading security packages and posting the results.

Read More »

Touch Office for iPad/Android — but not Windows?

A touch version of Office is scheduled for release around the time when we’ll see a production Windows 10, but recent releases of Office for iPad strongly suggest that Microsoft no longer considers Windows the “first” platform.

Read More »

Ending UAC headaches, once and for all

Windows’ User Account Control (UAC) helps keep us safe from unwanted system changes — but it can also get in the way of routine operations. With the right tools and techniques, you can fine-tune UAC so that commonly used programs don’t trigger UAC prompts.

Read More »

How businesses fail to protect customer info

Most Internet users should know by now that personal digital security is in large part our own choice and responsibility. But in truth, our electronic security is also in the hands of the companies we do business with — and they’re not all taking that fact seriously.

Read More »

Protecting yourself from POODLE attacks

No, this isn’t about Fluffy gone rogue. To keep our online browsing safe, we rely heavily security protocols — the “S” in HTTPS. But a new exploit — POODLE — shows that commonly used security protocols aren’t as secure as we thought; websites and browsers will both need an upgrade.

Read More »

How to safely test-drive Win10 — step by step

As with any product that’s still in development, running Windows 10 Technical Preview has risks. The safest and easiest way to install and work with the preview of the next Windows is within a virtual machine — here’s how.

Read More »

Why you should join Win10’s tech-preview process

Given the complaints about Windows 8, the next version of Microsoft’s OS has to be more than good — it must be superb. We’re still a long way from shipping Windows 10, but based on the recently released Technical Preview, it appears Microsoft is firmly back on track.

Read More »