MakeUseOf

Elliot Nesbo-Staff Writer for Security

Elliot Nesbo

Staff Writer for Security

Page 3

About Elliot Nesbo

Elliot has been a freelance tech writer for four years. He primarily writes about fintech and cybersecurity. He is highly knowledgeable about I.T. and online threats. His work includes articles about how to protect networks and personal computers against hackers.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
rear of av receiver on white background 1
10 Key Features Your AV Receiver Needs

If you're building up your home theatre equipment or just want a better AV experience, these are the features your AV receiver must have.

couple watching a projector screen in garden feature 1
How to Choose a Projector Screen

Buying a projector? You could project onto a white wall, but a proper projector screen works best.

laptop vs desktop split screen battle feature 1
10 Reasons a Desktop Is Always Better Than a Laptop

No, this isn't up for debate.

electric bike outside 1
How to Choose an eBike: 8 Key Features to Look For

If you're looking to buy an eBike, there are several things you must consider first.

hacking hackers deleting files 1
What Are Threat Actors and What Do They Want?

You might have heard the term, "threat actor", but what does it mean? Why do they threaten your online security? And how can you protect against them?

watchful pet looking on garden 1
Are Pet Trackers With GPS Safe to Use?

Pet GPS trackers can help you get your pet back if they run away or get lost. But they come with various security risks too...

cyberattacker on laptop 1
What Is a Gray Hat Hacker?

You may have heard of black and white hat hackers, but what does a gray hat hacker do? Let's find out.

@ symbol 1
What Is Vendor Email Compromise and How Can You Protect Against It?

Everyone should know about this variation of a typical phishing scam—which can lose you money and damage your reputation.

speaker audio sound 1
Active vs. Passive Speakers: What's the Difference? What Sounds Best?

They both make sound, but what should you choose for your home?

employees working together in an office 1
What Is Third-Party Risk Management and Why Is It Important?

Many businesses today rely on third parties for various tasks, but this could be a bad idea without proper risk management.

google logo in eye 1
8 Signs That Your Google Account Has Been Hacked

Google accounts are massive targets for hackers because they unlock so many opportunities. Here's what you need to look out for.

penetration testing security 1
Manual vs. Automated Penetration Testing: What's the Difference?

Penetration testing can be employed both manually and automatically to see if your network can resist cyberattacks, but which is better?

fingerprint secure scanning 1
What Is Fuzzing in Cybersecurity?

Fuzzing is a technique used by both security experts and hackers to find vulnerabilities in software. Here's what you need to know.

camera privacy surveillance 1
What Is User and Entity Behavior Analytics (UEBA)?

Learn in-depth about this relatively new cybersecurity solution that looks for suspicious activity and alerts businesses.

splintered data cells 1
What Is Network Segmentation and How Does It Improve Security?

Imagine the damage a hacker could cause if they got access to your whole system. Fortunately, network segmentation can ease your worries.

lock security posture on black background 1
What Is Security Posture and Why Is It Important?

Learn the importance of security posture and the various steps you need to take to improve it for your business.

stacking passwords login credentials 1
What Is Account Pre-Hijacking and How Does It Work?

You could fall victim to a scammer before you even sign up for an account on popular websites. Here's how it works and how to protect yourself.

solar panel power 1
What Is a Tesla Powerwall and How Much Do They Cost?

If you're looking to reduce your energy costs, Tesla's Powerwall is an excellent option.

office work productivity 1
What Is Bossware? Is It Tracking You At Home?

The work-from-home movement comes with some interesting caveats, with your privacy potentially being up for grabs.

secure padlock logo 1
What Is Phishing as a Service and How Does It Work?

Phishing is a bigger threat than ever before, thanks to Phishing as a Service (PaaS). So what is PaaS and how can you stay safe?

1 2 3 4 5
Page 3 / 8