MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 21

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Woman Working on a Laptop  1
What Is Process Injection, and How Can You Prevent It?

The most effective cyberattack is the one you can't detect. Process injection allows an infiltrator to hide in plain sight.

By 
unknown caller scam call 1
Stop Robocalls: How to Get Rid of Spam Calls

Ditch the annoying spam calls with Incogni.

By 
Someone holding a locked iPhone in the hand. 1
Should You Be Worried About Thieves Stealing Your iPhone Passcode?

Thieves are stealing iPhone passcodes, but is it a major cause for concern? What can you do to prevent it from happening? Here's all you need to know.

By 
blue and white email logo on home screen 1
Is Your Business Email Secure, and Who Is Able to Read Your Messages?

Which type of business conversations are more at risk—email or instant messaging? Bosses and hackers alike can get access to both.

By 
How hackers make exe files PDF 1
How a Trojan Virus Pretends to Be a PDF Using the RLO Method

A file can look like a PDF but actually be a malicious EXE. Here's how you can tell the difference.

By 
chatgpt openai logo on green background feature 1
No, There Isn't a ChatGPT Windows Client—It's Malware

Don't trust everything you read about ChatGPT.

By 
A person's finger pointed towards the observer, with cybersecurity icons around it 1
Why People Are the Weakest Link in the Cybersecurity Chain

The lack of cybersecurity awareness and poor security practices are the primary reason why cybercriminals see us as easy targets.

By 
Image of a Trojan statue 1
What Are Android Banking Trojans and How Do You Avoid Them?

Any device can be infected by a Trojan Horse, and Android phones are especially vulnerable. So what can you do to protect yourself and your finances?

By 
Google logo seen on white background 1
How Google Tracks You Even When You’re Not Using Its Services

You might think that, just because you don't use Google Chrome or the search engine itself, you steer clear of Google tracking. You'd be wrong.

By 
last pass logo in front of padlock and key 1
LastPass Reports DevOps Engineer Computer Breach in 2022 Hack

LastPass has released more details on its August 2022 data breach, stating that a DevOps engineer's home computer was targeted.

By 
Cyber security protection firewall interface concept 1
Can a Cybersecurity Awareness Course Keep You Safe Online?

If you're looking to train yourself and employees in solid cybersecurity measures, security awareness training is essential.

By 
close up photo of dextrose intravenous stand 1
Russian Hacktivists Target US Hospitals with DDoS Attacks

Russian hacktivism group KillNet has targeted US hospitals using DDoS attacks.

By 
people using laptop and pointing at screen 1
How to Bypass Internet Restrictions and Blocks and View Any Website

Need to access a blocked website? Try these tips and tricks to bypass internet restrictions and view the content you want.

By 
Beautiful Woman With a MacBook 1
What Is Data Masking and What Are Its Benefits?

Data masking is like setting up a decoy. Attackers think they've gotten their hands on your data, but the joke's on them.

By 
Rug pull and Pump and Dump 1
What’s the Difference Between a Rug Pull and a Pump and Dump Scheme?

Although you'll lose your crypto to either scam, how they operate is slightly different.

By 
Man and Woman Operating a Mobile Phone Smiling 1
What Is Identity Sprawl and How Can You Reduce It?

You've likely left traces of your identity all over the web. What can you do to keep your personal information from falling into the wrong hands?

By 
Spies watching people 1
VPN
5 VPNs Not Located in Five Eyes Surveillance Regions

You think your VPN is keeping you private, but what happens if it is overseen by a member of the Five Eyes surveillance alliance?

By 
Laptop on a desk with the word reported seen on the screen 1
Came Across a Fishy Website? Here's How to Report It

Found a shady website that you suspect is a phishing scam? It's your duty to report it! Here's why and how.

By 
VPN global map 1
VPN
Should You Use Hotspot Shield's Free VPN?

Hotspot Shield Basic is a free VPN service, but how good is it? Does it keep you safe online? Can you watch Netflix via Hotspot Shield?

By 
Fingers on a Laptop's Keyboard  1
What Are Enumeration Attacks and How Can You Prevent Them?

Attackers often need access to your network before they can do damage. Enumeration attacks offer both blunt and sneaky ways to get in.

By 
19 20 21 22 23
Page 21 / 75