MakeUseOf

Elliot Nesbo-Staff Writer for Security

Elliot Nesbo

Staff Writer for Security

Page 8

About Elliot Nesbo

Elliot has been a freelance tech writer for four years. He primarily writes about fintech and cybersecurity. He is highly knowledgeable about I.T. and online threats. His work includes articles about how to protect networks and personal computers against hackers.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
internet privacy information 1
What Is COPPA and Do Websites Adhere to It?

Here's everything you need to know about the Children's Online Privacy Protection Act.

privacy account password 1
Can You Trust Have I Been Pwned?

HIBP tells you if your data has been leaked anywhere... but can you really trust it with your username, password, and more?

hacker code screen 1
10 Ways to Protect Against Doxxing

Doxxing involves cybercriminals posting personal information online. Here's how to defend yourself from being doxxed.

Photo of a man using virtual reality 1
Why Does VR Make People Feel Sick?

Virtual reality is one of the newest forms of technology, but some using headsets report feeling sick. Here's why it happens.

angler phishing attempt 1
What Is Angler Phishing and How Can You Avoid Falling Victim?

Been contacted on social media by a company rep? Don't immediately trust them: it could be a angler phishing scam.

hacker dark anonymous 1
What Is a Man-in-the-Browser Attack and How Can You Prevent It?

You've likely heard of man-in-the-middle attacks, but how can you protect yourself from man-in-the-browser (MitB) attacks?

phone net reception 1
What is Vishing? The Voice Phishing Social Engineering Scam Explained

What is a vishing attack? Here's the definition of voice phishing and what you can do to combat the scam.

apple store icon 1
5 Reasons Apple Devices Are More Secure Than Android

Apple is known for its strong security measures, but why? What does the company do to actually look after your devices?

dollar notes cash 1
What Is Zelle and Is It Safe to Use?

Zelle is a payment app developed by banks, but is it really secure to use? What risks are involved?

error 404 bricks 1
What Does an Error 404 Mean? Fix the Page Not Found Error Message With These Tips

If you browse the web often, encountering a 404 error is inevitable. Here's how to resolve this common issue.

security computer icon 1
What Is the Business Email Compromise (BEC) Scam?

Here's what you need to know about the BEC scam attacks that target your company.

cyber hacker security 1
What Is an Advanced Persistent Threat and How Can an APT Be Detected?

What is an APT? These cyberattacks can have long-term ramifications, so here's how to spot an ATP and how to stop it.

working computer pen 1
What Is the Gig Economy and What Is a Gig Worker?

Need a job fast? The gig economy could be what you need.

 1
How Your iCloud Can Be Hacked and How to Protect It

You might be wondering if your iCloud can be hacked. Here's how cybercriminals can gain access and how to secure iCloud.

emails being sent 1
How to Send Encrypted Emails to Anyone with ProtonMail

Concerned your emails are not secure enough? Here's what you need to know about sending encrypted emails with ProtonMail.

Cloud services 1
Is Dropbox Secure Enough for Your Private Files?

Using Dropbox for backing up and syncing your vital, personal, and sensitive data? You might want to reconsider...

Alert icon on a computer 1
What Is PUP Malware and How Do You Remove It?

Potentially unwanted programs can prove more than a mild annoyance. Here's how to remove PUPs.

6 7 8
Page 8 / 8