MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 32

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
pointer focused on security 1
What Are Filter Lists, and Why Are They at Risk?

Security suites and browser extensions rely on filter lists, but their future is far from certain. Here's why.

By 
a customer making payment with a pos 1
What Is Point-of-Sale (POS) Malware and How Can You Protect Your Business From It?

Learn everything about point-of-sale malware so that you can implement the proper steps to protect your customers' information.

By 
text encryption with a security lock 1
Vim
How to Use Vim to Encrypt Text Files on Linux

It's easy to secure the contents of a text file on Linux by encrypting it with Vim.

By 
numerous servers lined up 1
VPN
What Is VPN Obfuscation and Why Is It Important?

VPN obfuscation disguises VPN traffic as normal web traffic and helps users bypass VPN blocks. Learn how it's done and why you need it.

By 
using your thumb print fingerprint 1
API
7 API Security Best Practices to Consider

Your API can be a security weak point, so make sure you protect it from hackers with the following measures.

By 
sudo command on terminal 1
What Is the CVE-2021-4034 Polkit Privilege Escalation Vulnerability?

Here's everything you need to know about the CVE-2021-4034 Polkit privilege escalation vulnerability in the Linux kernel.

By 
Image of a Wi-Fi Router in a Blurred Background  1
Everything You Need to Know About MAC Address Filtering

With MAC address filtering, you can prevent others from accessing the internet over your Wi-Fi network. So, learn how to use it.

By 
The Start menu opens on a Windows laptop 1
What Is Dynamic Lock on Windows? How to Use it

Make your phone the key to your PC with Dynamic Lock for Windows.

By 
Man Standing on a Cliff Infront of Seashore and Houses 1
Is Trip.com a Legitimate Travel Business?

Looking to go on vacation? You might've stumbled across Trip.com, but is it a legit company to use? Is it trustworthy?

By 
A woman using a VPN tool on her laptop 1
VPN
7 Disadvantages of Using a VPN

VPNs offer numerous benefits, are you aware of the potential drawbacks of using one?

By 
Bitdefender And McAfee Program On Windows 1
Bitdefender vs. McAfee: Which Security Suite Is Best for You?

Bitdefender and McAfee offer the best security suites for your computer. Here, we'll compare the two to help you make an informed decision.

By 
Mockup of a Laptop Showing the HackTool:Win32/Keygen Malware in Windows Defender Protection History 1
What Is the HackTool:Win32/Keygen Malware? How to Remove It on Windows

If your Windows has fallen ill with this nasty keygen, here's how to scrub it off again.

By 
bypass-firewall 1
How to Bypass a School Firewall: Tips and Warnings

Need to know how to bypass a school firewall? It's probably not a good idea, but here are several methods to try if you're desperate.

By 
Person with money in front of an ATM 1
What Is an ATM Jackpotting Attack and How Does It Work?

ATMs dispense huge sums of cash every day, and that makes them a big target for hackers.

By 
Man Working on Computer in Glass House 1
What Is Security Content Automation Protocol and Why Is It Important (SCAP)?

SCAP can serve as an effective method for organizations to automate vulnerability management. Here's everything you need to know about it.

By 
A padlock with the Twitter logo superimposed on it 1
How to Protect Yourself After the Latest Alleged Twitter Data Breach

Details of more than 400 million Twitter accounts are reportedly for sale, so what does this mean for your security?

By 
A padlock with codes placed on a keyboard beside a card with a chip 1
What Is a Time-Based One-Time Password and Should You Use One?

How can you provide further security for your online accounts? Additional authentication using a TOTP might be the answer.

By 
spam email coming out of computer with surprised man feature 1
What Is a Spam Bot and How Do You Stop Them?

Have you spotted loads of suspicious comments on websites, social media, and instant messaging platforms? Spam bots might be the reason.

By 
workplace environment desks 1
What Are the Security Risks Associated With Quiet Quitting?

Quiet quitting is harmful for productivity and success, but it can also be a threat to your company's security. Here's what you can do.

By 
Promotional image of the Galaxy S21 FE 1
6 Ways to Increase the Privacy and Security of Your Samsung Phone

Samsung Galaxy devices come with a number of options for keeping your data secure and private. Here's how to use them.

By 
30 31 32 33 34
Page 32 / 75