MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 38

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
rifling through ream of paper 1
How to Back Up and Print Your GnuPG Key to Paper

You don't have to store a backup digitally. Using paper might even be safer. Here's how to back up your GnuPG key the old-fashioned way!

By 
graphic illustration of someone trying to login on a computer 1
Everything You Need to Know About Wi-Fi Captive Portals

You've probably seen a Wi-Fi captive portal page when connecting to public Wi-Fi, but have you ever wondered why? Here's the answer.

By 
padlock on laptop keyboard 1
How to Generate Your Own GnuPG Key

By creating your own GnuPG key, you can encrypt your important files and correspondence. And it's not as difficult as it sounds. Here's what to do.

By 
black and white vpn globe graphic with alert symbol 1
5 Server Locations You Must Avoid When Using a VPN

If you care about your privacy and don't want to throttle your internet speed, avoid connecting to these countries when using a VPN.

By 
an envelope spewing trackers 1
What Is DuckDuckGo Privacy Essentials and Should You Install It?

The search engine, DuckDuckGo, offers users a Privacy Essentials add-on, so what does it do, and should you add it to your browser?

By 
Woman Working on a Computer Outside 1
What Is an Evil Twin Attack and How Can You Prevent It?

Do you often use public Wi-Fi? You might fall for an evil twin attack. So what is it? And how can you stay safe?

By 
Best BF software deals 1
Black Friday: Best Software Deals You're Going to Want

Black Friday is already here with some awesome software deals, so get your device some help.

By 
person logging into instagram on phone with google authenticator logo in front 1
Lost Your Phone With a Google Authenticator App? What to Do Next

Lost your smartphone and, with it, the Google Authenticator that lets you sign in securely to various accounts? Here's what you need to do.

By 
VeraCrypt and Microsoft Windows logos on a picture of a lock and chains 1
How to Encrypt a Windows System Drive With VeraCrypt

Here's how to keep your Windows drive or partition secure using encryption courtesy of VeraCrypt.

By 
cyberattacker on laptop 1
What Is a Sybil Attack and How Does It Affect Blockchain?

The so-called "Sybil attack" can cause havoc on a blockchain, so what actually is it? And how can crypto-enthusiasts protect themselves?

By 
hard drive on color background 1
What Are the Pros and Cons of Data Redundancy?

When it comes to important data, having more than one copy is vital.

By 
NordPass BF 1
NordPass Premium Price Gets Halved on Black Friday

This Black Friday, you can pay 50% less for the two-year NordPass Premium plan!

By 
PureVPN BF Deal 1
Save 82% on 2-Year Plans With PureVPN + Free Password Manager, & Save 89% on 5-Year Plans

This Black Friday, PureVPN is slashing the price of its 5-year plan and 2-year plan, so grab a subscription now!

By 
 1
7 Scams to Watch Out for on Black Friday and Cyber Monday

While you shop for deals this Black Friday and Cyber Monday, scammers will be looking for YOU. Here's how to shop safely online.

By 
Best Deals VPN & Security Tools 1
Black Friday: Best VPN and Security Solution Deals

This Black Friday, we also have to take care of our devices too, so let's see what VPNs and antivirus tool are on sale!

By 
A Christmas tree is seen on a computer screen 1
Cyberattacks Surge During the Holiday Season: Here’s Why

Cybercriminals don't take the holiday season off. Here's why cyberattacks increase over the festive period.

By 
Graphic representations of security features on several phones 1
How Out-of-Band Authentication Helps You Stay Safe Online

Out-of-band authentication is an increasingly common way of protecting your online accounts, one you've likely encountered without realizing it.

By 
e-commerce mobile shop 1
8 Tips to Spot Scam Products When Shopping Online

How can you tell a fake product from a legitimate one when doing your online shopping? Here are a few tell-tale signs of scam items.

By 
device webcam 1
Should You Always Put Tape Over Your Laptop Camera?

Don't like the thought of a hacker watching you through your webcam? Then you might consider covering it up. But how? What should you use?

By 
Black router with a security symbol 1
Static vs. Dynamic IP Address: Which Is More Secure?

Hackers can trick you using IP snooping, but with static and dynamic IP addresses available, which one offers the best protection?

By 
36 37 38 39 40
Page 38 / 75