MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 20

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
person looking at code on smartphone and laptop 1
What Is Mirai Malware and Who Is at Risk?

Originally released to disable Minecraft servers, this botnet has since caused chaos through DDoS attacks. Here's what you need to know.

By 
laptop showing wifi logins and vpns 1
Atlas VPN Is Free and Great for Streaming, but Will It Protect Your Privacy?

Atlas VPN is a freemium service with an excellent free plan. Learn its strengths and limitations to see if it's the right service for you.

By 
close up shot of macbook keyboard with hazard icon 1
Snake Keylogger Malware Removal Guide

Snake Keylogger malware could be noting your every single keystroke. Here's what to do to find and remove such a keylogger.

By 
Computer Devices on a Desk 1
5 Multi-Factor Authentication Vulnerabilities and How to Resolve Them

Multi-factor authentication (MFA) is a great way of securing your accounts, but it's not perfect. Here are a few ways hackers try to get around it.

By 
windows defender security notification on laptop screen 1
Does Antivirus Detect and Remove All Malware?

You pay for a good antivirus suite, so it should be able to detect all viruses and threats, right? That's easier said than done...

By 
Digital illustration of a human brain 1
AI Image Generators: An Emerging Cybersecurity Threat

Pictures made by artificial intelligence seem like good fun, but they can be a serious security danger too. Here's how.

By 
a fishing hook in a blue sea, grabbing onto bitcoin logo 1
Don’t Let the Elon Musk “Freedom Giveaway” Crypto Scam Swindle You

Been added to a Twitter list, supposedly by Elon Musk, promising a "Freedom" giveaway? It's a scam. Here's everything you need to know.

By 
lock icon in front of computer code 1
How to Create a Protected Route in React

Preventing unauthorized users from accessing your React page is critical for security. Here's how to do it.

By 
protonvpn logo with power symbol on tablet 1
ProtonVPN Launches Extensions for Multiple Browsers

VPN provider ProtonVPN has launched browser extensions for a number of web browsers.

By 
VPN shield, laptop on background  1
VPNBook Is Free, But Is It the Right VPN For You?

Most free VPNs are marred by limitations and drawbacks. Is VPNBook any different? Learn about its features and decide if it's the best fit for you.

By 
An anonymous cybercriminal, wearing a hoodie, working at a laptop. The scene is dark and the criminal facing us has a large question mark in front of their face. 1
Check Your Password Security With Python

Build your own password checker with this simple tutorial.

By 
what out for red flags of tech scams 1
How to Avoid the "Financial Hardship Department" Email Scam

The Financial Hardship Department scam goes after your money when you have little to spare. Here's how to keep your money secure.

By 
computer code on screen with hazy blue and purple focus 1
Why Cyberattacks Hit Higher Ed and What You Can Do to Stop Them

With stockpiles of student financial and personal records, a university with weak cyberdefenses can be a hacker's dream come true.

By 
text encryption with a security lock 1
How to Protect Your Files With Built-In NTFS File Encryption on Windows 10

Secure your data seamlessly with file encryption on NTFS drives.

By 
Image of Sign-In Screen on Laptop 1
What Is Phishing-Resistant MFA and How Can You Implement It?

Multi-factor authentication makes your accounts more difficult to hack, but phishing gets around that. What can you do to make phishing ineffective?

By 
Woman sat at laptop and thinking 1
VPN
10 Things to Consider Before Subscribing to a VPN

You're thinking about signing up to a VPN service. But do you really need one? Here's what you should think about before subscribing to a VPN.

By 
black and white photo of wh smith store with translucent alert logo in center 1
WH Smith Data Stolen in Cyberattack

British retail store WH Smith has fallen victim to a cyberattack in which data was stolen.

By 
A laptop on a wooden table with a Bluetooth logo on it 1
Bluebugging: What It Is and How to Stay Safe From Bluetooth Exploits

Bluetooth is a convenience way to connect two devices together, but it's also a convenient way to hack them.

By 
woman at desk looking at three screens 1
FTP
How Do Hackers Attack FTP Servers and What Can You Do About It?

Even the process you use to transfer files between devices can be attacked by hackers so data can be stolen. Here's what you need to know.

By 
person holding wallet and cryptocurrency coins in hands 1
Trezor Warns of Dangerous Crypto Phishing Campaign

Crypto wallet manufacturer Trezor has warned of a large-scale phishing campaign targeting users.

By 
18 19 20 21 22
Page 20 / 75