MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 27

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
chrome and safari logos in front of close up shot of fiber optic cables 1
Google Chrome vs. Safari: Which Is the Most Secure macOS Browser?

Whether you've got a Mac or MacBook, you need to know which is the better browse to use. Safari vs. Chrome: which is the best for you?

By 
Advanced Data Protection on iPhone 14 Pro 1
Apple's New Data Protection, Contact Key Verification, and Security Key Features Explained

Apple's new security features help verify that your data is actually private and secure. But there are some risks involved.

By 
Word and pdf document seen on black background 1
Can You Trust Online File Converters? Are They Safe to Use?

Want to change one type of file into another? Or remove a watermark? You might use a free online converter. But are they safe? Which should you try?

By 
computer devices managing data 1
What Is Data Manipulation Fraud and How Can You Avoid It?

Sometimes the goal of a cyberattack isn't to steal data, but to change it. The damage dealt can be just as serious.

By 
Windows Firewall Allow Featured 1
What Is IP Blacklisting and What Kind of Protection Does It Provide?

You can prevent quite a bit of harm online simply by blocking certain IP addresses. A blacklist helps you do this en masse.

By 
DuckDuckGo vs Qwant illustration 1
Qwant vs. DuckDuckGo: Which Search Engine Is More Private?

Qwant and DuckDuckGo both commit to being less invasive than the likes of Google. But which better hides your searches from prying eyes?

By 
Image of a woman shushing the camera 1
You Can Now Lock Incognito Tabs When Closing Chrome on Android

Google Chrome now lets you automatically lock your incognito session when you close the browser on your Android device.

By 
Man Typing on Computer  1
What Is a Threat Intelligence Platform and How Does It Work?

To enhance your cybersecurity, you need to get in the minds of a hacker. How might they attack? A threat intelligence platform could clue you in...

By 
laptop 1
What Is Extended Detection and Response and Why Is It Important?

Even those who aren't tech-savvy need to keep their networks secure. But how? That's where Extended Detection and Response (XDR) comes in.

By 
black and white shiba inu digital graphic 1
Reddit Users Discover Dangerous Shiba Inu Airdrop Scam

Reddit users have uncovered a cryptocurrency airdrop scam designed to drain wallets.

By 
a software developer working on a computer system. 1
5 Dangerous Web Application Vulnerabilities and How to Find Them

If you're creating a web application, you need to make sure it's secure from cyberattacks. So what flaws should you know about?

By 
Close up of Xbox Controller joysticks 1
Can You Turn Off Strict NAT Type College Wi-Fi?

Want to play and host matches with fellow Xbox gamers? It will largely depend on your NAT type...

By 
Woman browsing in a bookstore  1
What Is Personally Identifiable Information (PII)?

Sometimes called "personal data", PII is valuable to you, to companies, and to hackers. But what is it? What does it include?

By 
t-mobile logo in front of black and white photo of code 1
37 Million Customers' Data Exposed in Huge T-Mobile Breach

T-Mobile has suffered a huge data breach, in which 37 million customers' data was exposed to malicious actors.

By 
Images of different browsers  1
What Makes a Web Browser Secure? Look for These Features

Most browsers claim to care about your security, but that doesn't mean they do (especially out of the box). Here are some features to find and enable.

By 
A man promoting cryptocurrency to two women using a white board 1
What Is Crypto Shilling, and How Does It Affect the Crypto Market?

When someone is pushing you to invest or throwing out terms like "the next Bitcoin," they're probably shilling.

By 
Couple watching retro Netflix 1
How to See Who Is Using Your Netflix Account (And Stop Them)

If you think someone else is using your account, Netflix lets you see who has access to your account and (crucially) stop them from doing so.

By 
a person typing on a laptop while wearing a pair of fingerless gloves 1
Don’t Be a Pagejacker’s Victim: What Pagejacking Is and How to Stop It

Packjacking redirects a visitor and steals a website owner's source of revenue, causing panic for one and financial harm to the other.

By 
Duolingo owl seen on white background  1
Is Duolingo Safe? Here's Everything You Need to Know

Duolingo is great to help you learn a language, but what's its security like? Has it suffered any data breaches? And does it keep your data private?

By 
Man holds a smartphone with a weather app open 1
Your Weather App May Be Spying on You

Feeling under the weather? You'll be even more gloomy when you consider that the Weather apps on your smartphone could be selling your data.

By 
25 26 27 28 29
Page 27 / 75