MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 28

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Avatar face images 1
What Is the Difference Between Anonymous and Pseudonymous Data?

Anonymity is important, especially when it comes to data security and privacy. So how might websites and other services keep your data private?

By 
image of nebula behind malware graphic 1
What Is Bad Rabbit Ransomware?

Love Game of Thrones? So does the creator of this scary ransomware variant, which references the fantasy drama in its code.

By 
White Computer Screen Showing a Red Triangle with an Exclamtion Mark Inside 1
What Is a Remote Desktop Protocol Attack and How Can You Prevent It?

Many of us are relying on RDP as we work from home, and attackers are taking advantage of the opportunity. Here's how to stay safe.

By 
Person using a mouse 1
What Is Mousetrapping and How Do You Break Free?

An online mousetrap won't kill you, but being stuck is a frustrating feeling, and you may unwittingly download malware as you squirm.

By 
kids surrounding a laptop device 1
Is Your College or School Wi-Fi Safe and Do They Monitor It?

Can schools and colleges see what you search for via their public Wi-Fi? Is it safe to use your school's internet? Here's what you need to know.

By 
An email key on a keyboard 1
What Is Email Spoofing? How Scammers Forge Fake Emails

It looks like your email account has been hacked, but those weird messages you didn't send are actually due to email spoofing.

By 
Transparent shield seen over smartphones  1
What Are Android Security Updates, and Why Do They Matter?

Most Android phones get security updates every month. But what exactly are they, and is it important that you install them?

By 
Person Holding Debit Card 1
What Is Card Cracking and How Can You Prevent It?

Card cracking is another scam where something that seems too good to be true is, yes, too good to be true.

By 
kid-safe-amazon-fire 1
How to Set Up a Kid-Friendly Amazon Fire Tablet

If your children use an Amazon Fire tablet, you should make it safe for them to use. Here's how to prevent purchases and more.

By 
two hands holding red and black bitcoin tokens 1
How Are P2P Scams Carried Out? 5 Ways to Avoid P2P Scams

Cryptocurrencies are unregulated and come with little protection. The risk for scams is even higher when you're exchanging money peer-to-peer.

By 
ChatGPT logo seen on light green background 1
Will ChatGPT Become a Cybersecurity Threat? Here's What to Watch Out For

As fun as ChatGPT is, it could be a major security and privacy threat. Here are a few ways cybercriminals could use this AI chatbot.

By 
padlock on iphone bright background 1
Lost Your Phone? Here's How to Turn Off Two-Factor Authentication on Facebook Without a Phone

If you've set up this extra security step but lose your phone, here's how to disable two-factor authentication for Facebook.

By 
Location pin on a smartphone  1
What Apps Need My Location?

Apps require too many permissions these days. Most ask for location data. But why? And which apps actually need to know where you live?

By 
secure web icon 1
What Is Encrypted DNS? 4 Top Providers to Improve Online Privacy and Security

You may already encrypt all the things, but have you thought about shielding your DNS queries? Doing so offers some of the benefits of using a VPN.

By 
Man holds a smartphone next to a laptop 1
How to Hide Your MAC Address and Why You Should

Spoofing your MAC address can stop you from being tracked. Here's how to chance your MAC address on Windows and MacOS devices.

By 
country road with winter and summer mirror scene 1
How Can You Give Your Smartphone a Security Spring Clean?

Here are eight quick ways you can make sure your iPhone or Android smartphone is secure as we head into a new season.

By 
directories list ubuntu 1
What Is DLL Hijacking and How Can You Prevent It?

DLL files are an important part of Windows, but they can also leave you open to hacking. Here's what you need to know.

By 
VPN shield, laptop on background  1
VPN
12 Totally Free VPN Services to Protect Your Privacy

Free unlimited data VPNs don't exist unless they're scams. Here are the best actually free VPNs around that you can try safely.

By 
Windows 11 laptop 1
How to Configure a Windows Hello Fingerprint Login on Windows 11

A fingerprint is a quick but secure to log into Windows. Here's how to set up fingerprint recognition on Windows 11.

By 
Digital illustration shows a laptop screen with a shield and needle on it. 1
What Is a Fault Injection Attack (FIA)? Should You Be Worried?

Manufacturers use fault injections to test their products. Cybercriminals can use this method too. Here's what you need to know.

By 
26 27 28 29 30
Page 28 / 75