Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.
Security - Page 5: Buying Advice, Tips, and News

Latest Security Stories

Award-winning cybersecurity that protects your most valuable personal information doesn’t have to cost a small fortune.

By Jade Chung-Lee
Best Antivirus Deals

The unsealed indictment identifies three Iranians accused of hacking Trump's campaign, all of whom allegedly work for the country's Islamic Revolutionary Guard Corps.

By Michael Kan
Donald Trump

Microsoft promises its Recall feature won't screenshot your personal or financial information. It'll also require Windows Hello verification.

By Kate Irwin
Computer screen showing Windows 11 Recall open on screen, where 8 different windows or "screenshots" are showing up for a search about a Korean restaurant.

Elon Musk denounces Ken Klippenstein for sharing an oppo-research document stolen by Iranian hackers. X says it violates its rules on doxxing, but Musk was singing a different tune last year.

By Rob Pegoraro
Republican Vice Presidential candidate Sen. JD Vance (R-OH) speaks at an Aug. 15 event in New Kensington, PA.

Five years after the incident was uncovered and fixed, a European regulator is penalizing Facebook parent company Meta for violating the European Union's GDPR laws on data privacy.

By Michael Kan
Facebook logo
2.5

Norton Password Manager is a free app for popular browsers and mobile devices that lacks useful features offered by the competition.

By Kim Key
logo on white background

A new malware variant spreads across Android devices, infecting victims and targeting bank accounts by posing as NordVPN or Google Chrome.

By Kate Irwin
Close-up on hand holding Android phone, which shows some apps on its screen including messaging, calls, and Google Play Store.

The two men allegedly helped ransomware deployers and darknet drug traffickers launder ill-gotten gains.

By Kate Irwin
Russian flag cracked with Bitcoin gold coin on top.

Cybersecurity researchers demonstrate how they infiltrated Kia's dealership website to gain access to vehicles and drivers' personal information.

Kia tool hacking interface

Cops may not be convinced when you conveniently forget your phone’s new passcode. Also, don’t confirm your message-deletion habits in a message.

By Rob Pegoraro
New York Mayor Eric Adams at a July 2024 event at City Hall.

A fake WalletConnect app has been installed over 10,000 times on Android devices via the Google Play Store, successfully swiping over $70,000 in crypto thus far.

By Kate Irwin
Close-up on Android smartphone with Google Play Store app selected showing "My apps" submenu.

Be 'genuine' or be gone. If you try to game the system with bogus reviews, Google may lock down your page and tell visitors that suspected fake reviews were removed from the account.

By Jibin Joseph
A graphical illustration of how reviews are posted on Google Maps.

We test and rate password managers annually to determine the best value for keeping your credentials safe. Here we share our methodology and criteria.

By Kim Key
Illustration of a person surrounded by hashed passwords.

Apple continues to quietly remove VPNs from its App Store in Russia. It's reportedly deleted nearly 100 VPN apps this year alone.

By Kate Irwin
Close-up of iPhone home screen's top left corner, showing Apple App Store logo.

We wouldn't recommend a car without first getting behind the wheel, and we can't rate antivirus software without testing it. Here's how we get the malware we need to do our real-world tests.

By Neil J. Rubenking
How We Collect Malware for Hands-On Testing

After hackers stole a huge trove of personal information, National Public Data quietly updates its site to note that all users will be opted out of its data profiling services.

By Michael Kan
SSN cards

Local news station KWCH.com says a ransom note appeared on a water treatment facility computer in Arkansas City. It's unclear if the facility plans to pay the hackers.

By Michael Kan
Water faucet

Your data is valuable, so businesses try to siphon it from your devices using apps and websites. We tell you how to keep corporations (and hackers) from collecting data without your consent.

By Kim Key
hands on red background

Security researchers find that the malicious code used in the attack contained comments that were likely left by a generative AI program.

By Michael Kan
malware icon

Some US Kaspersky security users got a big surprise when their protection was suddenly replaced by UltraAV due to a government ban. But Kaspersky’s demise has been looming for years.

By Neil J. Rubenking
Kaspersky Timeline