More

    Security Reviews and Lab Tests

    PCMag editors select and review products
    independently.
    If you buy through affiliate links, we may earn commissions, which help support our
    testing.

    Security: Buying Advice, Tips, and News

    Latest Security Top Picks

    Latest Security Reviews

    Latest Security News

    Latest Security How-Tos

    LATEST VPN REVIEWS

    Latest Security Stories

    WhatsApp Reveals Bug that Enabled Targeted Attacks on Apple Users

    The campaign reportedly targeted users of the Mac and iOS versions of WhatsApp, and has been active for 90 days.

    2 hours ago

    By
    Will McCurdy

    Do You Trust Your Antivirus or Security Suite? Tell Us Everything

    Enter our $250 sweepstakes when you finish our annual survey on antivirus software and security suites, for home and work, and on your desktop PCs or mobile devices.

    18 hours ago

    Lose Your Device, Lose Your Accounts? Not If You Back Up Your Passkeys

    Passkeys are more secure than passwords since they’re tied to a device, but what if you lose your phone? The trick lies in how you generate passkeys in the first place.

    1 day ago

    By
    Lance Whitney

    Think You’ve Been Hacked? Here’s What You Must Do Before It’s Too Late

    Stolen passwords, hijacked email accounts, and compromised credit cards can wreak havoc on your life. If you’ve already been hacked, time is critical. We’ll show you exactly how to take control, recover fast, and lock things down to prevent it from happening again.

    1 day ago

    By
    Neil J. Rubenking

    Labor Day Security Deal: 33% off a Malwarebytes Premium Subscription

    While Malwarebytes has a free version, it’s worth getting the Premium version for its real-time malware protection. You can do so now for under $40 thanks to today’s deal.

    2 days ago

    By
    George Yang

    Are AI Browser Extensions Putting You at Risk? Prompt Injection Attacks Explained

    AI agents that can control and read data from an internet browser are also susceptible to obeying malicious text circulating in web content.

    2 days ago

    By
    Michael Kan

    Beware Credit Card Skimmers: How to Protect Yourself and Your Money

    Scammers use legit-looking devices to steal your credit and debit card information at gas pumps, department stores, and ATMs. Here’s what you need to know.

    2 days ago

    By
    Kim Key

    Lock It Down: 12 Simple Ways to Secure Your Online Life

    These days, every bit of info about you is for sale: your identity, your passwords, your browsing habits, even your address and phone number. These tips can easily help you take back control and keep your data safe.

    2 days ago

    By
    Neil J. Rubenking

    Think You’re Safe on Public Wi-Fi? Not Without These 12 Must-Know Tips

    Public Wi-Fi hotspots can be a goldmine for hackers. By following our simple security advice, you can protect yourself from identity theft and data loss—and surf safely instead of risking a digital disaster.

    2 days ago

    By
    Eric Griffith

    Your Credit Data’s Been Stolen and the Feds Just Left Your Info Out in the Open. What’s Next?

    Welcome to the new normal in cybersecurity. On the plus side, everyone’s offering you two years of free identity theft monitoring for losing your data!

    2 days ago

    By
    Alan Henry

    Rate the VPN Service or Services You Use for Online Privacy

    Do you use a virtual private network to protect yourself at home or work? Prefer a secure, private browser? Or perhaps you run an IT department and deploy a VPN? Help us determine which brands are the best for a chance to win.

    2 days ago

    We Can’t Keep This Deal Private: Save 40% Off the Editors’ Choice-Winning NordVPN

    NordVPN’s formidable suite of features can protect your traffic, scan for malware, and more. Now you can get a one-year subscription for $20 less.

    2 days ago

    By
    George Yang

    3 in 4 Americans Fear Data Risks While Traveling: Take These Simple Steps to Stay Safe This Holiday Weekend

    Our survey finds 75% of US adults worry about privacy while on vacation, but few are using tools like VPNs, ad blockers, or password managers.

    3 days ago

    By
    Justyn Newman

    The Best Proxy Services for 2025

    The best proxies we’ve tested are easy to use and offer affordable plans that will fit into your advertising, development, or content generation budget.

    3 days ago

    By
    Kim Key

    Your VPN Might Be Spying on You—Here’s How to Tell

    A VPN is supposed to protect your privacy, not monitor your activity. Learn how to know if your VPN is keeping logs of your online behavior, why it matters, and what you can do about it.

    3 days ago

    By
    Justyn Newman

    TransUnion Data Breach Exposes Data of 4.4 Million People

    After targeting a third-party application used by TransUnion, hackers accessed some personal data, but it doesn’t include credit reports or core credit information, TransUnion says.

    3 days ago

    By
    Jibin Joseph

    Your Data Is Already Out There. Can a VPN Do Anything About It?

    Data breaches are on the rise. While a VPN can’t prevent such an attack, it can help you mitigate the risk. Here’s how.

    4 days ago

    By
    Justyn Newman

    US Campaign Aims to Eject China’s ‘Salt Typhoon’ Hackers From Telecom Networks

    The FBI, NSA, and partner agencies in the UK, Germany, and Japan are sharing technical details to help companies protect their systems from China’s ‘Salt Typhoon’ hacking group.

    4 days ago

    By
    Michael Kan

    The Best Mac Antivirus Software for 2025

    Despite what you may have heard, your Apple computer isn’t immune to malware. We’ve tested the top programs to identify the best antivirus protection for Macs.

    4 days ago

    By
    Neil J. Rubenking

    The Best Antivirus Software for 2025

    Antivirus apps protect your PC’s personal information, data, bank accounts, and much more. We’ve tested more than two dozen utilities to help you choose the best antivirus for your needs.

    4 days ago

    By
    Neil J. Rubenking

     

    Latest articles

    Related articles