MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 19

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a red digital scam alert graphic with binary code in background 1
Don't Fall for the Shein Gift Card Scam: How to Protect Your Money and Identity

Received an email from Shein or an associate telling you you've won a free gift card? Does it ask you to fill out a survey? It's likely a scam.

By 
encryption security privacy 1
Physical Drive Encryption vs. Software Drive Encryption: What's the Difference?

How should you protect your personal information?

By 
digital graphic of blue shield and code with tunnel bear logo and lock icon on front 1
Should You Try Out TunnelBear's Free VPN?

TunnelBear is best known for its unlimited, paid-for plan, but it also offers a free version. Is it worth downloading the free VPN though?

By 
Login Interface on a Computer Screen 1
Lateral Movement in Cybersecurity: All You Need to Know

An unauthorized intruder can be easy to spot, but an attacker passing as an authorized user is virtually invisible. Is it possible to stop them?

By 
Instagram fake zombie account dangers 1
What Are Instagram Zombie Accounts? How to Keep Your Profile Safe

Instagram zombie accounts aren't dead (or even undead). They're often alive and growing, but they're not fully under your control.

By 
man looking at codes on computer screens 1
What Is Fork Bomb Malware and How Does It Work?

Also known as the rabbit virus, a fork bomb will mean you have to restart your computer to stop it overloading. And that's the start of your problems.

By 
Two Women and a Man Working in the Office 1
How to Tackle the Prevailing Cybersecurity Skills Gap in Society

Not enough people are educated about cybersecurity and that leaves everyone vulnerable. Here's why and how we can address this issue.

By 
Wise logo seen on light green background 1
Is Wise Safe to Use? Here's What You Need to Know

Previously known as TransferWise, many of us trust our money to Wise, but is it actually secure? How can you protect your Wise account further?

By 
a padlock in front of binary on a notepad 1
What Is a Security Operations Center?

Worried about your business falling prey to a cyberattacker? You might need a SOC. So what does a SOC do?

By 
Woman Working a Mac Laptop 1
What Is Secret Sprawl in Cybersecurity and Why Is It Dangerous?

Do you have data spread across numerous places? Most of us do, intentionally or by accident. But that can lead to many security issues.

By 
padlock with email at symbol in middle on blue background 1
Protect Your Inbox: Sign Up for MakeUseOf’s Free Email Security Course

It's completely free, and lands in your inbox each day for a week, helping you to boost your email security.

By 
icons illustrating encrypted collaboration 1
The 9 Best Encrypted Collaboration Tools You Need to Use

Whether collaborating via email, video, or instant messaging, you need to use platforms with end-to-end encryption to secure your data.

By 
smartphone security 1
How to Get the Android March 2023 Security Update That Patches Two Key RCE Exploits

The Android security update for March 2023 is rolling out and it fixes two critical bugs. Here's why you don't want to skip this one.

By 
laptop with red alert icon on screen 1
New HiatusRAT Malware Campaign Targets Business Routers

A new malware campaign is targeting small business routers to steal data.

By 
auctioneer's hammer gavel 1
Is DealDash a Scam or Can You Get Legit Bargains?

You might have seen DealDash's too-good-to-be-true ads. But is it a scam? If not, how does DealDash actually make money? Let's find out.

By 
VPN shield, laptop on background  1
VPN
Hardware VPNs vs. Software VPNs: What Are the Major Differences?

Most of us are familiar with VPNs, but did you know you can get both software and hardware VPNs? Here's how to choose which is right for you.

By 
Cookies vs Spyware on blue gradient background 1
Are Tracking Cookies Spyware and Can You Disable Them?

Tracking cookies collect information about you, but whether they're considered spyware comes down to the matter of consent.

By 
Woman Working at Home 1
6 Ways to Secure Your Data at Rest

Any information that's stored somewhere is a big target for cybercriminals. So how can you make sure it's secure?

By 
Watching a soccer game, snacking 1
How to Install and Use a VPN on Google TV

Use these VPNs on your Android TV to stream what you want without any restrictions.

By 
Graphic illustration of a woman filling out a survey on a computer screen 1
What Are Online Survey Scams and How Can You Avoid Them?

One unlikely method cybercriminals use to gain access to your personal information is through online surveys. Here's how and why.

By 
17 18 19 20 21
Page 19 / 75