MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 35

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Woman using a laptop 1
What Is Web Content Filtering?

Stop your kids (or employees) from going to inappropriate websites.

By 
Apple iCloud service 1
Why Apple Abandoned Its Plan to Scan Your iCloud Photos

Privacy wins yet again as Apple users no longer need to worry about the company scanning their iCloud photo libraries.

By 
crypto exchange interface on smartphone 1
7 Signs of a Suspicious Cryptocurrency Platform

Cybercriminals develop crypto platforms dedicated to stealing your money. Here are some red flags to watch out for to keep your crypto safe.

By 
Two CCTV cameras looking in opposite directions 1
How AI Cameras Detect Objects and Recognize Faces

Ever wondered how a camera can recognize your face, and your face specifically in a crowd?

By 
An illustration of Tutanota vs ProtonMail 1
ProtonMail vs. Tutanota: Which Encrypted Email Service Is Best?

We compare Tutanota and ProtonMail, accounting for security and privacy features, spam filters, ease of use, and more.

By 
phishing key on keyboard  1
The Biggest Security Threat of 2023? It's Phishing

There's an abundance of scams cybercriminals use to target your private data. So what's the biggest threat of 2023? The answer might shock you.

By 
Packages on a doorstep 1
Getting Free Items From Amazon? It Might Be a Brushing Scam

Random packages turning up at your door may be a sign of something bigger, but there's no reason to worry just yet.

By 
Finger seen above a smartphone keyboard  1
My Smartphone Keyboard Isn't Working Properly: Is Malware the Cause?

Malware can cause all sorts of performance issues on devices, including your iPhone or Android device. So does that include your keyboard too?

By 
Man holding an AirTag and an iPhone 1
Has Apple Done Enough to Make AirTags Safe?

Apple can't seem to take a break from AirTags stalking allegations. But what has the company done so far to keep AirTags safe? And is that enough?

By 
Blue email symbol seen on a dark background with web 1
Has Your Email Address Leaked to the Dark Web? How to Check and What to Do

Do you think your data has been compromised? Here's how to check if your email has leaked to the dark web, and what to do about it.

By 
close up shot of raspberry pi board with company logo 1
Raspberry Pi Hires Former Police Officer With Background in Surveillance Tech

The Raspberry Pi Foundation has hired an ex-police officer with experience of hiding Pi boards in various objects, including a piece of chocolate.

By 
hackers targetting a docker container 1
3 Reasons Why You Shouldn’t Run Docker Without sudo

Docker is a secure containerization platform for developers. But if it's so secure, why can't you run it without superuser privileges?

By 
highlighting importance of privacy 1
6 Ways Your Privacy and Security Were Threatened in 2022

Our world isn't very conducive to anyone concerned about their privacy. Here are a few ways cybercriminals have been stealing your data in 2022.

By 
Green symbols falling on a display Matrix-style 1
What Is Lattice-Based Cryptography and Why Is It Important?

Quantum computing has the power to break regular cryptography algorithms. Here's why lattice-based cryptography will protect us in the future.

By 
metallica lux aeterna single cover screengrab feature 1
Metallica Warns Against Onslaught of New Album Crypto Scams

The metal band is warning against scams relating to the announcement of its new album, but it's too late for some people.

By 
coding and open pc  1
How to Prevent Cross-Site Scripting Using HTML, JavaScript, and DOM

Cross-scripting vulnerabilities leave your website open to manipulation by attackers. So how can you stop XSS attacks?

By 
A Graphic Representation of Mails Moving from Computer to Bin  1
What Is a Disposable Email Address and Why Should You Use One?

A site asks you for your email address. But you don't entirely trust it. So what do you do? A disposable email might be the answer.

By 
Phone in chains 1
What Is Mobile Device Management (MDM) Software?

Your work phone has extra software on it that your employer installed. Learn more about MDM software.

By 
comparing codes on laptop and PC 1
How to Prevent File Upload Vulnerabilities

Any website that allows users to upload their own files can be attacked by hackers. Fortunately, there are things you can do to secure your site.

By 
Image of a Hacker in Hoodie with a city background 1
The 5 Biggest Data Breaches of 2022

Here are some of the most notable data hacks of the past 12 months, taking into account the number of people affected and the type of info leaked.

By 
33 34 35 36 37
Page 35 / 75