MakeUseOf

Ankush Das-

Ankush Das

Page 4

About Ankush Das

Ankush is a tech aficionado exploring the cybersecurity space to help consumers secure their digital life in the simplest way possible. He's had bylines at various publications since 2016.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
quantum safe vpn 1
Verizon's Quantum-Safe VPN: What You Need to Know

How do you maintain encryption if cybercriminals use quantum computing to decrypt data? Verizon might just have an answer...

hive ransomware warning 1
Here’s Why the FBI Issued a Warning for Hive Ransomware

The FBI issued a warning about a particularly nasty strain of ransomware. Here's why you need to be especially wary of Hive ransomware.

android flubot malware 1
What Is Flubot Malware on Android?

Android users need to know about this spyware that can be spread by SMS and steals financial data.

ryuk ransomware 1
What Is Ryuk Ransomware?

Ryuk is unlike numerous ransomware iterations. Here's what you need to know about the malware that only targets critical functions.

Illustration of a VPN lock on a computer 1
Do You Need a VPN to Keep Your Internet Activity Private & Safe?

VPNs are often touted as one of the best ways to stop others from seeing your online activity. But do you really need one?

android crypto mining 1
Fake Android Crypto Mining Apps: Here's What You Need to Know

Looking to make a quick buck through cryptocurrency mining? Be careful because you shouldn't trust every crypto app on the Play Store.

cryptojacking-ransomware 1
Cryptojacking vs. Ransomware: What's the Difference? Explained

Both cryptojacking and ransomware are threats to your cybersecurity, but how do they differ? What do they actually involve?

ddg-startpage 1
DuckDuckGo vs. Startpage: Which Private Search Engine Should You Use?

What's the best private search engine? We compare the two most notable privacy-focused services, Startpage and DuckDuckGo.

secure cloud 1
How Secure Is Your Data in the Cloud?

Just how safe is the data you've stored in the cloud? You may be surprised.

Healthcare ransomware 1
Why Is Healthcare a Target for Ransomware Attacks?

Ransomware poses a huge threat to medical institutions. Here's why and what that means for you.

vpn review 1
Can You Really Trust VPN Reviews?

Looking to invest in a VPN? You should check reviews first—but can you always trust them to be impartial?

brave browser 1
10 Reasons Why Brave Browser Is Becoming So Popular

You might have heard of Brave as a browser option. Here's why Brave is becoming such a popular choice.

android apk 1
Google Is Moving Away From APKs for Android Apps: Here's Why

The new Android App Bundle format is set to replace APKs in the Play Store. What does that mean for you?

cloud storage 1
Factors to Consider When Choosing a Secure Cloud Storage Service

Looking for the right cloud storage system for you? Make sure it's secure and private with these tips.

discord stage channels 1
Discord Stage Channels: Everything You Need to Know

Discord has launched Stage Channels, which works somewhat similar to Clubhouse. But why would you use it, and how do you?

smartphone updates 1
6 Things to Update to Keep Your Smartphone Secure

Want to make sure your Android or iOS device is secure? Here's what you need to keep up-to-date.

Cloud Storage Security 1
10 Tips to Keep Your Cloud Storage Safe and Secure

For many, clouds are now an extension of external drives. Keeping your storage safe is essential; here's how to do it.

 1
Malware Hides Inside Steam Profile Pictures: What You Need to Know

Malware has been found hiding in the EXIF data of Steam profile photos, so are you at risk? How can you protect yourself?

capcut 1
Is the CapCut App Safe to Use?

CapCut was created by the makers of the controversial TikTok, so can you trust CapCut? Is it secure and privacy-friendly?

A malware warning 1
Can Malware Trick Your Antivirus to Bypass Ransomware Protection?

Antivirus software doesn't always stop ransomware. Here's how cybercriminals bypass it and what you can do about it.

2 3 4 5
Page 4 / 5