MakeUseOf

Kinza Yasar-

Kinza Yasar

Page 2

About Kinza Yasar

Kinza is a technology journalist with a degree in Computer Networking and numerous IT certifications under her belt. She worked in the Telecommunications industry before venturing into technical writing. With a niche in cyber-security and cloud-based topics, she enjoys helping people understand and appreciate technology.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Spider-Man reading a book 1
How No Way Home Is Being Used to Scam Spider-Man Fans

Cybercriminals are taking advantage of the hype surrounding the release of Spider-Man: No Way Home to phish for credit card data. Here's how.

Man working on a laptop.  1
What Is Log4j? How to Protect Yourself From the Log4j Vulnerability

One of the biggest security vulnerabilities of recent times, Log4j could have serious repercussions. So how can you protect yourself?

A lock on a computer screen.  1
10 Critical Steps to Take After a Ransomware Attack

Ransomware attacks can leave you without your data, your money, or both. If you're a victim of a ransomware attack, follow these steps.

Firefox browser image.  1
How Firefox 95 Is More Secure Than Previous Versions of Firefox

Mozilla has introduced a new sandboxing technology with its latest Firefox 95 browser release. Does it make Firefox more secure than ever?

Two jars filled with honey.  1
What Is a Honeypot and Can It Help Mitigate Cyberattacks?

A bait for luring threat actors, a honeypot is used by cybersecurity professionals to test a network's vulnerability.

HTTPS in the browser bar.  1
HTTPS Everywhere Has Turned 10: Here's What's Changed and Why That Matters

A browser extension that encrypts and secures your communication with websites, HTTPS Everywhere has come a long way. But is it bidding farewell now?

Man clicking on a keyboard.  1
What Is a Zero-Click Attack and What Makes It So Dangerous?

Requiring "zero" user interaction, no amount of security precautions or vigilance can deter a zero-click attack. Let's explore further.

Security logo 1
What Is Cobalt Strike and How Can Security Researchers Use It?

Cobalt Strike is an adversary simulation tool used by security teams during vulnerability assessments. Let us explore this useful tool in detail.

Photo of a squirrel eating a nut 1
What Is the SquirrelWaffle Malware? 5 Tips to Stay Protected

A piece of malicious software, SquirrelWaffle is designed to cause chain infections. Let's learn more about this vicious malware.

home network connection smartphone app feature 1
How to Set Up a Secure Home Network

Learn how to set up your home network securely, keeping your devices and data safe at all times.

AirTag on a key chain 1
Can Stalkers Track You Using Apple AirTags?

Apple AirTags are great at tracking your misplaced belongings, but they might be giving stalkers a chance to track you as well.

typing on laptop 1
What Is Typosquatting? How to Protect Yourself Against It

A form of URL hijacking, typosquatting targets people who accidentally mistype a website address into the browser.

Microsoft Defender Security 1
How to Activate Tamper Protection in Windows Defender (and Why You Should)

The tamper protection feature in Windows 11 now provides improved ransomware protection. Learn how to activate it now.

Ring Video Doorbell 1
Is Your Ring Doorbell Invading Other People's Privacy?

While a Ring doorbell is great for your security, it might be invading your neighbor's privacy.

Man holding cybercrime sign.  1
What Is Cybercrime? Online Crimes Explained

Cybercrime exploits technology to carry out illegal activities, but how does it work and what forms does it take?

Dropbox-2FA-Featured 1
How to Track A Stolen Device Through Dropbox

Have you lost your device or had it stolen? There could be a way of finding out who has it, if you already have Dropbox installed...

remember your password 1
How to Remember Passwords Without a Pen and Paper

Weak and stolen passwords are the number one reason behind data breaches. Learn how to remember your passwords securely.

Credit card reader.  1
ATM
7 Ways a Criminal Can Use a Credit Card Skimmer Against You

Even with security chips and advanced biometric features in place, credit card data can be stolen through stealthy credit card skimmers.

apple stores 1
Apple Tackles App Store Scams With New "Report a Problem" Button

Amid the growing App Store scams and negative publicity, Apple has restored the option to report suspicious apps.

Mom Using Tablet with Children 1
Internet Safety: 50+ Tips to Keep Your Kids Safe Online

Children are prime targets for online predators and cyberbullies. These handy tips can teach parents how to keep them safe online.

1 2 3 4 5
Page 2 / 5