MakeUseOf

Elliot Nesbo-Staff Writer for Security

Elliot Nesbo

Staff Writer for Security

Page 6

About Elliot Nesbo

Elliot has been a freelance tech writer for four years. He primarily writes about fintech and cybersecurity. He is highly knowledgeable about I.T. and online threats. His work includes articles about how to protect networks and personal computers against hackers.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
internet speed options 1
Learn How to Improve Internet Speed With These 8 Tricks

Your internet speed is fixed, but that doesn't mean there aren't a few neat ways you can try to optimize your connection.

ip spoofing security 1
What Is IP Spoofing and What Is It Used For?

Faking an IP address is a handy technique used by hackers. But what attacks can they carry out, and how do you protect against IP spoofing?

hacker with a face mask.  1
What Is Hacktivism and Is It the Same as Hacking?

Activist hackers sound quite scary, but maybe you've just misunderstood them. Learn who these techno crusaders are and what motivates them to act.

satellite internet orbit 1
Half of Americans Want to Switch to Starlink Satellite Internet: Here's Why

Starlink is bringing the internet to more than rural areas, and a surprisingly large number of people want into Elon''s big project.

usb charger port 1
Are Public Smartphone Charging Stations Safe to Use?

Should you plug your device into a public charging station? Here's everything you need to know about juice jacking.

security sign with a lock  1
What Is DDoS-for-Hire and Why Is It a Problem?

Has your website been a victim of a Distributed Denial of Service attack? It could be a result of DDoS-for-Hire.

online gaming speed 1
8 Tips to Reduce Latency and Speed Up Your Cloud Gaming Experience

Cloud gaming is awesome! That is, so long as you have an awesome internet connection. Check out these tips if you need some extra speed.

Photo of shirts in a store 1
How Does Stitch Fix Work and Is It Any Good?

Many shoppers have considered a personal shopper to help them save time and pick better-fitting outfits. Stitch Fix is one such service.

phone security privacy 1
How Do You Check a Site Is Secure on Your Smartphone?

Shopping online or checking your bank account via your Apple or Android device? Here's how to check the site you're visiting is real.

Illustration of a padlock on a circuit 1
What Is Polymorphic Malware?

Polymorphic malware is far from uncommon. But what exactly is it?

Photo of a person using their phone 1
What Is the Google Voice Scam?

Scammers often exploit technology to get their way, and Google Voice is on many of their radars.

google account eye 1
8 Ways Your Google Account Can Be Hacked

Your Google account holds a massive well of data, and that makes it a big target for cybercriminals. Here's how hackers target your account.

virtual world internet 1
The Metaverse vs. Virtual Reality: 6 Key Differences

Are the metaverse and virtual reality one and the same? Or are they different? Wait, do they overlap? Here's what you need to know.

Syntax highlighted code in a text editor 1
What Is a Hypervisor? Is It Different From a Virtual Machine?

You probably see the two terms mentioned together: hypervisor and virtual machine. But what are they, and how do they differ?

privacy anonymity security 1
What Would Happen if Online Anonymity Ended?

There are always calls for an end to online anonymity. But such an infringement on human rights would come at great cost. Here's why.

hacker phishing security 1
5 Ways Your Amazon Account Can Be Hacked

If a cybercriminal gets into your Amazon account, they could cost you a fortune! So how can hackers get into your account, and how can you stop them?

online security privacy 1
VPN
10 Easy Ways to Reduce Your Online Footprint With a Few Clicks

Wherever you go online, you leave a digital footprint, which can be used to track you. But don't worry: there are easy ways to reduce that trail.

antivirus security protection 1
Norton and Avast Merge: What Does This Mean for Online Security?

As two antivirus giants merge, you might be wondering what this means for customers. And what does it mean for the cybersecurity industry?

computer code screen 1
Virtual Machine vs. Container: What's the Difference?

A virtual machine virtualizes an operating system. So, what's a container, then? Are they the same? Here's what you need to know...

RAID hard drives 1
All the Different RAID Types Explained

Heard about RAID but unsure if it's right for you? Check out our quick guide to RAID to learn the differences and when you should use each type.

4 5 6 7 8
Page 6 / 8