MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 33

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
VPN global map 1
The 5 Best VPNs With Obfuscated Servers

Obfuscated servers disguise VPN traffic as normal web traffic. We take a look at the best providers that offer obfuscation to fight VPN blocks.

By 
A hand holding a phone displaying a record of calls and messages 1
What Is a Pretexting Attack and How Can You Protect Yourself?

Anyone can fall for a pretexting attack, which means hackers can steal your precious personal data. Here's what you need to know.

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
Island Hopping Attacks: What They Are and How to Protect Yourself

Two of the most notable hacks in recent history have been through island hopping attacks. So what are they and how can you stop them?

By 
key opening a padlocked gate snowing 1
If You've Ever Used LastPass, You Should Change All Your Passwords Now

The password manager, LastPass, has been breached by hackers, which means your master passwords could be for sale.

By 
person holding iphone displayng lockscreen keypad 1
What Is the Smartest and Safest Way to Store Your Passwords?

It's vital you keep login credentials for online accounts safe from cybercriminals. But what's the best way to do that?

By 
Windows XP logo with bandages in front of Bliss wallpaper 1
Which Browser Is Most Secure on an Old Windows XP System?

What's the most modern browser that still works on Windows XP? Here are the best web browsers for Windows XP, compared.

By 
Spying 1
7 Types of Passive Attacks That Can Easily Go Undetected

Like a spy lurking in the shadows, those conducting passive attacks don't want you to know they're keeping an eye on you.

By 
A Bitcoin token 1
4 Security Threats to Blockchain Networks You Need to Know About

Thinking of investing in cryptocurrency? You first need to know about the security risk posed to blockchain networks.

By 
A man stretching out to touch an email icon  1
Secure Email Gateways: Your First Line of Defense Against Email Security Threats

Cybercriminals increasingly attack via email, so what can you do to protect yourself and your business? A Secure Email Gateway is the answer.

By 
An image of the Discord logo on a black tablet 1
The Dangers of Discord: What Is a Discord Virus?

Discord is a fun place to chat with friends. Unfortunately, that also makes it an attractive place for people looking to take advantage of others.

By 
Router that's semi-invisible with lock icons around it 1
How to Hide Your Wi-Fi Network: Everything You Need to Know

Wireless networks are less secure than wired networks. Here's how to hide your Wi-Fi network from others and what you should know about doing so.

By 
woman typing on laptop 1
Are University Courses Helpful for a Career in Cybersecurity?

University might not always seem the right route for you, especially if you want to go into cybersecurity. But is university worth it after all?

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
4 Types of Active Attacks and How to Protect Against Them

Active attacks are direct efforts to circumvent someone's online defenses. When you know what to look for, you can better beef up your own security.

By 
record audio phone 1
Is It Legal to Record Calls on Your Smartphone?

Just because you can doesn't mean you should or that it's even legal to do so.

By 
A command line interface displaying a malicious code 1
Why You Should Update File Sharing Platform, Samba, Right Now

Vulnerabilities have been found in Samba, software that lets you access shared files. So here's why it's vital you install these updates.

By 
iPhone-submerged-in-water 1
What Is a Watering Hole Attack and Are You at Risk?

Imagine a watering hole in the wild. Predators can target their prey by converging on such a site. An online watering hole works similarly...

By 
multiple spam warning signs 1
What Is Malspam and How Can You Protect Yourself?

Spam is annoying, but malspam is dangerous. Don't click any links or download attachments, and back away slowly.

By 
Someone holding an iPhone with the Google page open 1
How to Fix Google Authenticator Codes That Have Stopped Working

Are your Google Authenticator codes not working? It might be related to a problem on your phone. Here's how to fix it.

By 
Man On Laptop Opening Google Browser 1
How a Simple Browser Search Can Lead You to a Scam

Many of us click on the first search engine result that comes up, but doing so puts you at risk of being scammed.

By 
logi camera watching 1
How to Force Windows 11 to Notify You When Someone Accesses Your Camera

Who's peeking at you? Check when someone's using your camera on Windows 11.

By 
31 32 33 34 35
Page 33 / 75