MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 23

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
hacking looking out from apple device 1
A Brief Guide to the Different Types of Spyware

Feel like you're being watched? Spyware could be operating on your device. The first line of defense is knowledge, so here's what you need to know.

By 
activision logo on binary code background 1
Activision Hack Exposes Employee and Game Data

Activision Blizzard has confirmed a data breach in which data on employees and games was stolen.

By 
padlocked shield 1
What Is an Incident Response Retainer?

Don't have enough money to hire an IT team to protect your security? There might be another way to stave off hackers.

By 
coinbase logo on smartphone feature 1
Coinbase Employee Targeted in SMS Attack

A Coinbase employee has fallen victim to an SMS-based cyberattack, in which certain data was made vulnerable.

By 
Family Watching Video on Laptop   1
What Is Microsoft Family Safety? Everything You Need to Know

Microsoft Family Safety helps you manage your family's digital consumption. Here's everything to need to learn about it.

By 
comparing blocks of vpns 1
VPN
NordVPN vs. ExpressVPN: Which VPN Should You Use in 2023?

ExpressVPN and NordVPN are two of the best VPN services, but which is right for you? We compare prices, advanced features, and more.

By 
microsoft outlook logo next to spam mail on smartphone  1
Microsoft Outlook Users Flooded With Spam After Filters Break

Microsoft Outlook users have reported waves of spam mail after the email provider's spam filters seemed to have stopped working.

By 
accessing somewhere using a pin 1
What Are Broken Authentication Vulnerabilities?

Hackers could gain access to private accounts via session IDs, information sharing, and more. Here's what you need to know.

By 
A lock on a screen with binary numbers 1
Password vs. Passphrase: Which Is Better for Your Online Security?

Let's consider what you should know about passwords and passphrases before you choose which one to use.

By 
A Man Working on a Laptop With Headphone on Representing a Hacker 1
What Is Callback Phishing and How Can You Protect Against It?

A callback phishing email isn't actually dangerous. It's how you respond that leaves you vulnerable.

By 
Men Working on Computers 1
What Is a Network TAP and How Does It Secure Your System?

A network TAP is a standalone device that can help you monitor what happens on your network, and it's outside the reach of hackers.

By 
 Image of Login Window on Laptop and Hacker Behind the Laptop  1
What Is FormBook Malware and How Do You Remove It?

Infostealer malware like FormBook can give someone else access to your most sensitive data. Here's how to stop that from happening.

By 
dangers of the cloud 1
6 Reasons to Avoid Cloud Services and Keep Your Feet on the Ground

Thanks to services like Dropbox and Google Drive, we're giving up a lot more than we're getting when we use cloud storage. Here's a look at why you should be worried.

By 
reddit logo in front of web network graphic 1
How Can You Keep Your Reddit Account Private?

Scams are rife on Reddit, so how can you keep your account private and secure? Here are some simple tips to stay safe.

By 
magnifying glass on maths book 1
What Role Does Mathematics Play In Cybersecurity? Check These Examples

Are you hoping for a career in cybersecurity? It's important you have some understanding of math too. Here's why.

By 
Lady Using Mobile Phone Outside 1
What Is a Mobile Risk Assessment? 5 Good Reasons to Perform One

If you don't know where you're at risk, you don't know what to defend. Here are ways to help determine the security of your mobile device.

By 
a man working on his laptop sitting by the window 1
How to Create Your Own Online Proxy Server in Minutes

It's easier than you think to get your own proxy server up and running. Here's everything you need to know.

By 
A Phone, Tablet, and Laptop on Top of Each Other 1
7 Simple Security Mistakes You're Making Right Now

Here are some common but overlooked habits you're probably guilty of that put your cybersecurity at great risk.

By 
Safe links 1
8 Quick Sites That Let You Check If a Link Is Safe

Before clicking any suspicious link, use one of these link checkers to check that it doesn't lead to malware or other security threats.

By 
Black Woman on Laptop 1
Can Automation Replace People? 8 Key Roles Humans Play in Cybersecurity

Machine learning has helped computers do a better job of blocking attacks, but people still have a vital role to play in keeping data secure.

By 
21 22 23 24 25
Page 23 / 75