MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 16

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
mobile phone showing a security sign turned on 1
The Top 10 Mobile App Security Threats That Put Your Data at Risk

Mobile apps have become one of the most common ways for cybercriminals to gain access to devices and suck up user data.

By 
Selective Focus Photography of Motherboard 1
Security Chips Explained: What You Need to Know

Few of us know that our devices are fitted with security chips, so what do they actually do? How do they keep you safe?

By 
Using a VPN on a phone 1
VPN
Should You Only Use Independently Audited VPNs?

Some VPNs advertise that they're independently audited, but what does this mean? Are those the only trustworthy VPNs?

By 
black and white jigsaw puzzle with red skull in missing piece 1
Jigsaw Ransomware: What Is It and Are You at Risk?

This often-used ransomware can encrypt your data and threatens to delete your files if you don't pay quickly.

By 
vpn app active on smartphone 1
What Are the Pros and Cons of Avira's Free Phantom VPN?

Avira offers a free VPN for users, but how good is the service if you don't have a paid-for subscription?

By 
Man Smiling and Texting Outside 1
Fog Data Science and Law Enforcement Are Buying Your Data: What Can You Do?

It's legal for apps to sell your data, but is it okay for companies to buy that information without your consent?

By 
Green Android Symbol Placed Beside a White Box 1
DNS
Android's Private DNS Feature: Everything You Need to Know

Most web traffic comes from mobile devices, and most of those devices run Android. Here is a simple way to better secure what we do online.

By 
WhatsApp logo infront of padlock illustration 1
How to Make WhatsApp More Secure and Private: 8 Tips

Protect your privacy and security on this instant messaging app.

By 
illustration of Tezos, Bitcoin, and Ethereum blocks 1
What Is Double Spending in Blockchain and How Is It Prevented?

Double spending can erode all trust in a cryptocurrency, which is why so much effort has gone into making sure this type of fraud doesn't happen.

By 
An attacker with a clickjacking attack 1
Here’s Why You Might Be Sharing Your Camera With a Cyberattacker

A hacker might be spying on you via your webcam and microphone. And you allowed them that access. Here's how.

By 
digital graphic of code on laptop with red open lock icon 1
What Is Doxware and Is It Dangerous?

Ransomware comes in many forms, and one of the most troubling is doxware. So what does it do, and how can you avoid falling victim?

By 
black and white photo of youtube app on smartphone with linus tech tips logo in central front 1
Linus Tech Tips' YouTube Account Was Hacked to Promote Crypto Scams

The popular YouTube channel, Linus Tech Tips, has been hacked, with live streams of crypto scam videos being uploaded by attackers.

By 
Uninterested Formal Man Looking at a Laptop Screen  1
What Is Cybersecurity Fatigue and How Can You Overcome It?

Bored of keeping your accounts secure? It's nonetheless a necessity, and any fatigue can mean your security is at risk.

By 
greek myth of a trojan entering the city of troy 1
Can Trojans Replicate Themselves?

You've likely heard Trojan horses be called "viruses", but that's not technically true. Here's why.

By 
Person using BeReal 1
Is BeReal Safe to Use?

While BeReal hasn't had major security incidents, there are some risks to be aware of.

By 
Man in a Hoodie in the Dark 1
What Are Reconnaissance Attacks and How Do They Work?

Just like conducting reconnaissance before a physical assault, assailants often gather intel before a cyber attack.

By 
Displaying a White Screen on a Silver Laptop 1
How to Install Microsoft Defender Application Guard for Edge in Windows 11

Protect your PC better with the Microsoft Defender Application Guard for Edge.

By 
Facebook app on smartphone and macbook 1
How to Check If Someone Else Is Accessing Your Facebook Account

It's bad news if someone has access to your Facebook account without your knowledge. Learn how to know if Facebook account has been breached.

By 
instagtam-screenshot-notification 1
Everything You Need to Know About Instagram Screenshot Notifications

Does Instagram notify people when you screenshot a Story, post, or DM? Here's what you need to know about its screenshot notifications.

By 
Phone with green shield shown on red background  1
What Is Mobile App Security?

Think about all the personal information contained on your smartphone. How can you keep that secure? How can app developers protect your info too?

By 
14 15 16 17 18
Page 16 / 75