MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 15

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Man Working on a Laptop 1
What Is Vulnerability Remediation and Why Is It Important?

It's better to discover your own weak spots and alleviate them than to find out what they are during an attack.

By 
artificial intelligence brain above body in suit feature 1
How AI and Machine Learning Can Detect and Prevent Malicious Attacks

People are necessary to defend against cyber attacks, but there are key ways in which machines can help.

By 
A woman with binary codes describing artificial intelligence 1
Is It Possible to Use Artificial Intelligence for Penetration Tests?

Can artificial intelligence tell you about a program's vulnerabilities? Perhaps, but you may not want to put all your faith in what it says.

By 
Various Devices Connected to a Cloud Network 1
11 Endpoint Security Best Practices You Must Follow to Stay Protected

If your employees can access company data using personal devices, they may be the weakest link in your security. Here's how to keep your network safe.

By 
linux-security-camera 1
The 8 Best DIY Security Camera Apps and Software for Linux

Looking for a DIY security webcam client for Linux? These Linux-compatible apps are ideal for any DIY security cam project.

By 
Black Lady in Front of a Laptop 1
What Is Defense in Depth? How to Stop Cyberattacks Using Layered Security

Don't stop with one layer of defense when you can have several. It's the surest way to deter attackers and keep your data safe.

By 
shopping bags and packages placed in a trolley standing next to a laptop 1
The Suzhichou Scarf Scam: What You Need to Know to Avoid Being Duped

It may be surprising, but here's a scam where the main point isn't necessarily to steal your money or your personal information.

By 
Identity Thief Stealing Credit Card Information Online 1
What Identity Theft Victims Should Know About Credit Repair Companies

Have you fallen victim to ID theft? It might have wrecked your credit score. So what can you do about it? Consider a credit repair company...

By 
Fingers Typing on a Laptop Keyboard 1
How to Check for and Remove a Keylogger on Your Windows PC

What you type can reveal a lot about the sites you visit, the people you talk to, your passwords, and your most personal information.

By 
OneNote logo inside Sony Android Phone 1
How Hackers Are Using OneNote Files to Spread Malware

Do you download OneNote files as attachments? Most people trust such files. But they could download malware onto your device.

By 
klarna and afterpay logos on laptop screen being used by person 1
Klarna vs. Afterpay: Which Is Safer to Use?

If you're choosing between Klarna and Afterpay for a BNPL option online, there are many factors to consider. But which option is safer to use?

By 
Image of Apple, App Store, and Apple Store gift cards 1
How to Recognize and Avoid Free Gift Card Scams: 7 Warning Signs

Received an email or social media message saying you've won a free gift card? It's likely a scam. Here's how to tell.

By 
A hacker on a laptop 1
What Is LLMNR Poisoning and How Can You Prevent It?

The Windows PCs connected to your local network could be vulnerable. Should you secure your LLMNR usage or do without the feature entirely?

By 
Doctors Working on a Computer 1
5 Ways to Measure Cyber Risks in Healthcare

Healthcare institutions are prime targets for cyberattacks and various forms of fraud. Whether as a worker or a patient, what should you look out for?

By 
cybersecurity padlocked data 1
What Is Security as a Service?

Security as a Service is a model that means you don't require your own security experts; that's one of many reasons to consider SECaaS providers.

By 
iPhone with a grid of social media pictures and huge exclamation mark on screen 1
These 9 Things in Your Social Media Pictures Could Put You in Danger

Make sure your photos and videos shared on social media don't include these bits of information.

By 
Graphic illustration of a spy figure with the word spyware  1
5 Kinds of Spyware You Need to Know About

Your PC, smartphone, and other devices can all be spied on. Spyware isn't always installed by hackers either. Here's what you need to know.

By 
iPhone with a grid of social media pictures and huge exclamation mark on screen 1
Can You Get Malware on an iPhone? Here's How to Check

You might be wondering if iPhones can get viruses. Here's how to scan for malware and how to remove a virus from your iPhone.

By 
Alcmtr.exe stylized 1
Is ALCMTR.EXE a Malicious Process?

Do you see this app running on your Task Manager?

By 
blue lock graphic on laptop on desk 1
TunnelBear vs. Windscribe vs. AtlasVPN: Which Free VPN Service Is Best?

These three VPN services offer free plans, but which is best? We compare security features, speeds, limitations, and more to find out.

By 
13 14 15 16 17
Page 15 / 75