MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 26

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Image of Two Mobile Phones Represenaitng a Fraud  1
How Zelle Scams Work and How to Protect Against Them

Zelle is a handy payment platform, but that means its users are big targets for scammers. Here's what to watch out for.

By 
a security logo displayed on a screen 1
How to Install Nessus on Kali Linux

Nessus is a great vulnerability scanner with free and paid-for options. Here's how to download and start using Nessus on Linux.

By 
How to Install and Setup BitWarden Add-On on Home Assistant 1
What Is Bitwarden Send and Should You Use It to Secure Your Private Data?

Plenty of us send sensitive data via insecure methods like email. That's a risky strategy. Fortunately, Bitwarden Send can help secure information.

By 
A person using a MacBook. 1
Mac
How to Uninstall Norton Security or Norton 360 From a Mac

Installing Norton from your Mac doesn't have to be difficult. This article shows you how to do it.

By 
Using a VPN on a phone 1
VPN
VPN Evolution: 10 Ways VPNs Have Become Even More Private

VPNs offer far more privacy options than an encrypted internet connection.

By 
Loading the Gmail Website on a Macbook 1
What Does a Spam Email Look Like? 8 Phishing Examples

Everyone thinks they won't fall for a phishing scam, but people still do. So what are the red flags you need to watch out for? Here are some examples.

By 
data privacy 1
It’s Easy for Scammers to Buy Your Personal Details Online: Here’s How You Can Protect Your Data

Don't let scammers get hold of your personal data; use Incogni to remove your details from a wide range of databases.

By 
Parental control of children 1
Massive T-Mobile Data Breach, Smartphone RAM Explained, and Parental Controls for Phones and Tablets

Our tech podcast for technophobes tackles parental control software and whether your phone has enough RAM.

By 
two people using pair of computers on desk 1
Ice Breaker Malware Used to Hack Gaming and Gambling Companies

Hackers are using Ice Breaker malware to attack the gaming and gambling industry.

By 
black and white matrix background and google fi logo 1
Google Fi Suffers a Data Theft After T-Mobile Breach

Google Fi has suffered a data breach and has stated that its partnership with T-Mobile led to the incident.

By 
Hacker writing codes in front of computer screens 1
Danish Banks Hit By DDoS Cyber-Attack: Is Your Financial Information Safe There?

With DDoS attacks on the rise, is your banking data safe with targets like banks?

By 
user input login details 1
What Is Input Validation and Why Is It Important?

Any website that requires users to fill out input fields can also be attacked by hackers. So how do cybercriminals do this? And how can you stop them?

By 
talking about paypal logo 1
Does PayPal Refund Scam Victims?

PayPal doesn't always give you your money back, despite its reputation. Here's why and how to get a refund on PayPal if you've been scammed.

By 
Photo of a Red Car Parked on the Street 1
What to Do After Your Car Has Been Stolen (and What to Do if It's Recovered!)

After the initial shock, there are several key steps to take.

By 
Blue and Yellow Phone Modules 1
What Is Hardware Hacking and Should You Be Worried?

Software is the most obvious way a hacker can target your devices, but hardware hacking can also pose a security risk.

By 
raspi-vpn 1
VPN
How to Install a VPN on Your Raspberry Pi

A VPN is a vital part of online privacy and security. Here's how to set up a VPN on your Raspberry Pi with OpenVPN.

By 
Reddit logo seen on grey background  1
4 Reddit Scams to Watch Out For

Are you an avid Redditor? Or looking to join Reddit? Here are some common scams you need to be aware of.

By 
An Image Of Two Hands Working on a Laptop  1
You Need to Change Your RDP Port to Stay Safe: Here's How

With more people working remotely, hackers routinely target the default RDP port number. Changing the port is an easy way to block such attacks.

By 
hand holding padlock on one finger in front of a mushroom cloud 1
The LastPast Data Breach: Do Hackers Have Your Encryption Keys?

The fallout from the 2022 LastPass data breach may be even more radioactive than initially thought. Here's what you need to know.

By 
swapping decryption key for money 1
Where Do Most Ransomware Attacks Happen in the USA?

Ransomware is scary, but are you likely to be affected? Here's where hackers attack the most and what you can do to protect yourself.

By 
24 25 26 27 28
Page 26 / 75