MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 36

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Image of Shield Representing Cybersecurity  1
8 Behavior-Based Safety Tips You Must Follow to Stay Safe Online

By slightly tweaking your online behavior, you can keep yourself safe from scammers and hackers. It's easier than it sounds.

By 
Computer screen displaying a  1
Google's "Unusual Traffic" Error: What It Means and How to Fix It

Google might show that its systems "have detected unusual traffic" from your device. Does this mean you're infected with malware? Not necessarily...

By 
man typing coding on computer 1
How to Use Burp Suite's Intruder Tool to Pentest Web Apps

Are you an ethical hacker or pentester? You'll likely have used Burp Suite. So how do you use its Intruder tool to get better targeted results?

By 
Padlock over a background of code 1
NVIDIA and AMD Fix 30+ Security Holes: Update Your Graphics Driver Now

NVIDIA and AMD have released their latest drivers to fix security holes. Here's why you should update now...

By 
Ethereum, Bitcoin, Ripple, Monero logos seen over a photo showing trading graphs on computers 1
Why Do Crypto Companies Keep Getting Hacked?

Cryptocurrency exchanges have lost millions through security breaches in the past decade. So why are they such a huge target for hackers?

By 
 1
The 6 Most Secure Cloud Storage Services

Here are the most secure cloud storage services if you want online storage that's encrypted and safe from prying eyes.

By 
Photo of a Black Phone on a Black Surface 1
What Is GrapheneOS and Is it Better for Your Privacy?

GrapheneOS is a custom version of Android that claims to prioritize your privacy and security. But does it? Should you switch to GrapheneOS?

By 
person using exchange on laptop 1
What Is a Nested Crypto Exchange and How Can You Spot One?

Nested crypto exchanges are bad news. Here's why.

By 
Man in Suit Working in the Office 1
How Vulnerability Disclosure Helps You Stay Ahead of Cyberattacks

Cybercriminals try to exploit vulnerabilities on as many machines as possible. It's vital to disclose and fix issues before they get the chance.

By 
An anonymous cybercriminal, wearing a hoodie, working at a laptop. The scene is dark and the criminal facing us has a large question mark in front of their face. 1
How Do Hackers Make Money, Legally and Illegally?

You're probably picturing a shady hacker stealing your personal information. But how do they actually make money, both illegally and legally?

By 
Woman Working on a Laptop 1
What Is Data Synchronization and Why Is It Important?

Keeping all your data sets in sync is important to combat data losses and breaches. So how does data synchronization work?

By 
a person typing on a laptop 1
Make Your MySQL Server More Secure With These 7 Steps

How can you make sure your MSQL database is safe from hackers? Take a belt-and-braces approach with this handy checklist.

By 
last pass logo in front of padlock and key 1
Customer Data Accessed in LastPass Password Manager Breach

LastPass has announced that customer data was accessed in a security breach, marking the company's second hack in 2022.

By 
a remote worker 1
How to Find Someone's Username Across All Social Platforms

Social Analyzer is a command line tool or web app that feels almost like a super power. Like any super hero, be sure to use your powers for good.

By 
spy behind windows logo 1
Google Discovers an Exploit Framework Used to Spread Spyware

Google has discovered an exploit framework using now-patched Windows, Firefox, and Chrome vulnerabilities to deploy spyware.

By 
VeraCrypt logo on picture of chained fence 1
How to Use VeraCrypt’s Advanced Features to Secure Important Files

Are you encrypting your data using VeraCrypt? Here are some advanced settings to help you protect your sensitive files.

By 
check successful failed login attempts windows 1
How to Check Successful or Failed Login Attempts on Your Windows Computer

Do you suspect someone is trying to sneak into your Windows computer account? Here's how to set up a tracker for login attempts.

By 
Depiction of an anonymous VPN connection 1
VPN
3 VPN Features You Should Use to Avoid VPN Blocks

VPNs are excellent privacy tools but many countries and online services block VPN traffic. Learn how they do it and how you can bypass these blocks.

By 
A figure with a mask on sitting beside a table and clicking on a computer 1
Don’t Be a Victim of Click Fraud: Here's How to Protect Yourself

Click fraud can be bad both for advertisers and publishers. Know how to gather reliable data and prevent opening your wallet to scammers.

By 
Twitter logo seen on dark blue background 1
5 Common Twitter Scams and How to Avoid Them

If you regularly use Twitter, you could fall prey to scammers. Here's what you need to look out for while using social media.

By 
34 35 36 37 38
Page 36 / 75