MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 24

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
digital graphic of anonymous hooded figure 1
New Mirai Malware Variant Targets IoT Devices and Linux Servers

A new Mirai malware botnet variant is being used to attack IoT devices and Linux-based servers.

By 
A person wearing a VR console headset 1
The Top 9 Dangers of Using the Metaverse

As with anything linked to cryptocurrency, the metaverse has a lot of pros and cons. And its security issues definitely need to be taken into account.

By 
An infected computer 1
7 Essential Windows Processes That Could Be Hiding a Virus

Viruses like to disguise themselves as legitimate Windows processes. Here are some of the hottest targets for malware.

By 
tiktok app on smartphone iphone 1
7 Reasons TikTok Is Bad for Everyone

TikTok is a significant stain on the already-tainted world of social media. You should delete your account today. Here's why.

By 
data security password login 1
Should You Say Goodbye to Passwords in 2023?

Passwords can be stolen, and it's a hassle to remember them all. Is it possible yet to do without passwords entirely?

By 
Man Operating a Mobile Phone 1
What Is Mobile Threat Defense? How to Keep Smartphones Secure

With so much of our digital lives conducted on the go, it's not enough to keep our desktops and laptops secure. How do you guard mobile devices?

By 
google privacy sandbox 1
What Is Google's New Privacy Sandbox for Android and How Can You Join the Beta?

Google's new Privacy Sandbox is coming to Android and lets users protect their data and avoid being tracked. Here's what you need to know.

By 
grayscale united states capital roof dome 1
What Is the Biden Administration 2023 National Cybersecurity Strategy?

The White House Office of the National Cyber Director is issuing a new cybersecurity strategy. So what is it? And why?

By 
Apple and Android logos seen on dark background 1
iPhone vs. Android: Which Offers More Privacy?

The battle rages on between fans of Android and of Apple devices, but when it comes to privacy, which OS is better for you?

By 
20 Notifications on a Smartphone Email App 1
7 Email Security Mistakes You're Making (and How to Fix Them)

Don't become complacent with your email security: it's a prime way cybercriminals can hack your accounts.

By 
Different Profiles Connecting With Each Other Showing Networking 1
How to Change Which Facebook Friends Can See You Online

It's possible to maintain privacy on Facebook. Here's how to decide which Facebook friends can see you online and which can't.

By 
Image of a Laptop Screen Showing a Chained Paddle Lock 1
What Is Triple Extortion Ransomware? Here's How to Prevent It

You may have protected your data by keeping regular backups, but that doesn't stop someone from leaking stolen information online.

By 
Payoneer logo on white background  1
Is Payoneer Safe? Here's What You Need to Know

Is Payoneer secure? It's a great service to keep and transfer your funds, but should you feel safe using Payoneer?

By 
programming on a mac laptop device 1
What Is a MAC Spoofing Attack and How Can You Prevent It?

A MAC is an identifier unique to your device, but even this can be used by hackers to attack you. Here's how.

By 
A laptop with words you've been scammed on the screen 1
Will Coinbase Refund Your Crypto if You're Scammed?

Coinbase is one the biggest and most popular crypto exchanges, but what happens if you get scammed on its platform?

By 
Popular Apps Free Discount Featured 1
What Is Software Cracking, and What Are the Risks of Using Cracked Software?

Using cracked software can sound like a tempting way to get paid software for free, but aside from being illegal, it's also dangerous.

By 
hooded person behind discord logo 1
Look Out for These 6 Scams on Discord

Discord is a great place to socialize, but the people you mingle with might be cybercriminals. Here are some of the scams you should watch out for.

By 
Mockup of a Laptop Showing a Browser Hijacked With TabSearch Hijacker 1
What Is the TabSearch Hijacker? How to Remove It From Your Browser

Such malware can redirect your searches and take control of your browser in other ways, giving attackers access to more parts of your computer.

By 
fishing login details from browser 1
Clicking on Google Search Results Could Cost You All Your Passwords

Don't immediately click on the first link shown on Google results pages: they could be fake phishing pages that collect your private data.

By 
Woman Working on Laptop at Home 1
What Is a Cybersecurity Maturity Model and How Does It Work?

You don't have to be an expert in cybersecurity to secure your systems. You can use an already-established maturity model to protect yourself.

By 
22 23 24 25 26
Page 24 / 75