MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 11

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
spy protection illustration 1
What Is Industrial Espionage and How Can You Protect Your Private Data?

No business wants its private information falling into the hands of a competitor. How could that potentially happen and how can you stop it?

By 
The Thunderbird logo with a darkened and blurred screenshot of the application in the background. 1
How to Encrypt Email in Thunderbird

Thunderbird comes with the option for end-to-end encryption, but the process can be convoluted. Here's what you need to know.

By 
a person entering their iPhone PIN seen via shoulder surfing 1
iOS
How Shoulder Surfing Can Compromise Your Apple ID and Private Data

Apple is known for its strong security measures, but human error can still mean you can fall victim to criminals.

By 
small bitcoins in glass jar of honey 1
What Is a Crypto Honeypot Scam?

Tempted to peek at another cryptocurrency trader's seed phrase? Not only will you be a thief; you could also be falling for a scam!

By 
The cloud is sitting on a blue motherboard 1
Is Data Stored in the Cloud Secure?

While no security system is fool-proof, thanks to encryption, redundancy, and 24/7 monitoring, your data should stay on the safe side of the cloud.

By 
Error message image 1
Visiting an Unsecured HTTP Site? 5 Ways to Encrypt and Secure Your Data

If you have to visit a website that doesn't have "HTTPS" in its URL, your data isn't safe. Here's what you can do about it.

By 
Man Lamenting on Laptop  1
10 Common Incident Response Plan Mistakes and How to Avoid Them

Having an incident response plan is crucial in case something goes wrong, but many people make the same errors.

By 
Man's finger pointing at a home outline with a bulb icon 1
Are Smart Homes Safer Homes? How to Make Your House Unhackable

Smart home devices often advertise their safety, but they also come with risk. Here are tips to improve the security of your home using smart gadgets.

By 
Black and Green Vertigo of Binary Numbers 1
256-Bit AES vs. XChaCha20: Which Is More Secure?

The good old AES is still considered a golden standard for online security while XChaCha20 is simpler, faster, and future-proof.

By 
A metal plate with numbers engraved on it 1
Should You Use a Password Generator to Protect Your Online Accounts?

You probably know you need strong passwords to stay safe online. A password generator can help you create them.

By 
Girl Working on Laptop in Bed With a Dog 1
What Is Internet Protocol Security and Why Is It Important?

You might have heard of internet protocol security, but do you know completely what it means?

By 
Exterior view of Eldorado Arcade, one of its existing venues in the series 1
What Can You Learn About Cybersecurity From the Mr. Robot TV Series?

Mr. Robot stars Rami Malek as hacker, Elliot Alderson. But how realistic is it? What can viewers learn about fighting hackers from the TV show?

By 
padlocked chains around a laptop 1
Why Your Mac Is No Longer Safe From LockBit Ransomware

Think Apple's macOS is completely secure? The infamous LockBit gang is looking to target Macs with dangerous ransomware.

By 
An illustration of email marketing 1
Can My School or College See Emails I Send and Receive?

Do you have a school, college, or university email account? You might be wondering, then, if anyone monitors your inbox and sent folder...

By 
black and white image of apps on phone behind alert icon 1
What Are Malicious Apps and How Dangerous Are They?

Malicious apps can be found on even legitimate app stores, but what actually are they? How common are untrustworthy apps?

By 
opening texting apps on smartphone 1
Can Messaging Apps Track Your Location?

Remember when you got lost and shared your live location on WhatsApp? Yes, even text and messaging apps know where you are...

By 
person connecting to remote servers using SSH 1
SSH
13 Ways to Secure SSH Server Connections on Linux

SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.

By 
blue notebook with numbers on the cover placed next to laptop and pen on wooden surface 1
The 4 Best Places to Store Your Recovery Codes

Should all else fail, you might have recovery codes to regain access to your accounts. But how can you safely store these vital number strands?

By 
mac-dock-everything 1
7 Types of Apps You Should Install With Caution on Your Mac

Be careful while installing third-party apps on your Mac, especially the ones that fall under any of these categories.

By 
chalked number grid on ground 1
What Is a Recovery Code, and How Does It Keep Your Accounts Safe?

Two-factor authentication isn't the only way to secure online accounts. Recovery codes help you get your profiles back if cybercriminals hack them.

By 
9 10 11 12 13
Page 11 / 75