MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 29

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
red flag blowing in wind 1
The Top 7 Malware Warning Signs to Look Out For

Worried your device is infected by malware? Or want to recognize the symptoms of an attack? Here are some red flags you need to know about.

By 
shops spending spree sunglasses 1
What Is Wish? Is Wish Legit, Safe, and Reliable for Shopping?

Wish is an increasingly popular online shopping service. But is it safe to buy (potentially inferior) goods from China?

By 
hacking into bluetooth laptop smartphone coding 1
What Is Screen Hacking and How Can You Protect Yourself?

Hackers could access your device, install malware, and access personal data via lock screen hacking, also known as ghost touch. But what is it?

By 
Graphic illustration of a world map with navigation 1
5 Google Maps Alternatives That Actually Respect Your Privacy

Still using Google Maps to find your way around? The app collects a lot of private data. So which mapping apps are better for your privacy?

By 
Laptop with code on a table with a plant in a coffee shop 1
What Is a Salami Attack? You May Be a Victim and Not Even Know It

A salami attack can slowly dwindle away your bank account, bit by bit. Being sneaky is the name of the game.

By 
Software Engineer Standing Beside Server Racks 1
What Are Local File Intrusion (LFI) Attacks and Should You Be Worried?

If your site runs on PHP, you might be at risk of local file intrusion attacks. But how are they carried out and what can you do about them?

By 
privacy please sign 1
Can Your Android Phone Be Tracked When It’s Turned Off?

Does powering down your Android phone mean that it can no longer be tracked? Here's what you need to know.

By 
creating passwords on ubuntu 1
10 Ways to Generate Secure Passwords on Linux

It's crucial you use strong passwords for your online accounts. And you can even get your computer to choose one for you.

By 
Padlock with asterisks on white background   1
What Are Rainbow Table Attacks?

How do cybercriminals access your accounts? They might use rainbow tables to find out your password. Here's what that means and what to do.

By 
big brother watching camera 1
How to Stop Advertisers From Tracking You Around the Internet

Everyone knows that websites track you when you visit. But why and how? And how can you stop them doing this?

By 
Credit cards seen on a circuit board 1
Can You Trust Your Browser With Credit Card Information?

Shopping online and tempted to save your credit card information in your browser? Here's why you might not want to do that.

By 
Person trying to steal a credit card. 1
How Credit Card Fraud Works and How to Stay Safe

Credit cards and gift cards are regularly stolen. How do thieves get your card? How can you keep safe from credit card fraud?

By 
unlocked phone showing 5g on homescreen corner 1
5G
6 5G Security Risks You Need to Know About

5G technology is being rapidly adopted by consumers and businesses across the country. Explore emerging security pitfalls and possible safeguards.

By 
programming codes on PC screen 1
What Is an OS Command Injection?

You might have heard of this dangerous attack vector, but what actually are command injections? How do they work and how can you protect yourself?

By 
Couple watching TV 1
12 Ways Hackers Can Attack and Take Control of Your Smart TV

Your smart TV is just another computer connected to your network, and there's a good chance it's not a well-protected one.

By 
earth surrounded by network web behind pi icon 1
What Is the Pi Network? Is Pi Coin a Scam?

The Pi Network is attracting heaps of investors, but is it worth your time? Is the Pi Coin a scam?

By 
pink-code-computer 1
New Dark Pink APT Group Targets Government and Military in Asia Pacific

A new APT group known as Dark Pink is targeting government and military bodies in the Asia-Pacific region.

By 
web network with multiple points 1
Here's How Decentralization Can Help Protect Your Privacy

Much of the web is centralized, but there are major privacy benefits that come with decentralization. Should you seek out decentralized alternatives?

By 
remove pin greyed out windows 11 1
How to Fix the Greyed-Out Remove PIN Option in Windows 11

Want to remove the Windows 11 PIN login option but can't? Here's how to fix it.

By 
malicious attacker in the cloud 1
What Is Cloud Malware? Types of Attacks and How to Defend Against Them

The cloud consists of countless servers, and malware can target those computers just like any other. How do we keep the machines in the cloud safe?

By 
27 28 29 30 31
Page 29 / 75