MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 41

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
web-app-increase-security-with-http-headers 1
What Are HTTP Security Headers and How Do You Use Them?

How can you increase the security of your website? Security headers are a great and simple way of keeping your visitors safe from hackers.

By 
suspicious man hiding behind white mask 1
What Is Crypto Mugging and How Can You Stay Safe?

Someone doesn't have to resort to phishing or malware to get access to your cryptocurrency. Some thieves simply use good old-fashioned mugging.

By 
Replay symbols shown before a desktop computer 1
What Is a Replay Attack? Here's Everything You Need to Know

It doesn't necessarily matter if you use encryption: you can still fall for this cyberattack, which can see you losing your personal details and cash.

By 
black and white photo of trojan horse 1
What Is a Trojan Horse in Cybersecurity? How Does It Work?

Most people have heard of Trojan malware, but what is it? What are the most prevalent types? And how can you stay safe?

By 
Close-up Photography of Black and Green Computer Keyboard Keys 1
How to Find and Remove WMI Persistence Malware From a Windows PC

WMI persistence malware can hide on your computer in plain sight. Fortunately, it's easy to get rid of it from a Windows PC.

By 
picture of a mobile phone with google chrome logo on screen 1
App
How to Check if In-App Browsers are Tracking You Using InAppBrowser

If you're concerned about in-app browsers tracking you, InAppBrowser is a handy tool you can use to check. Here's how to use it on mobile and desktop.

By 
cyber-security-frameworks-for-companies 1
5 Cybersecurity Frameworks Companies Use to Protect Data

Cybersecurity is big business and an ever-growing challenge. Here are some of the approaches companies use to protect information we all store online.

By 
A laptop running code beside flower vases on a counter 1
What Is the VENOM Vulnerability and How Can You Protect Yourself From It?

You might have heard that the VENOM vulnerability might be worse than Heartbleed, but is that true? What is VENOM? What can you do about it?

By 
Semi Transparent Image of Privacy Icon on Circled Pattern  1
What Is an MFA Fatigue Attack and How Can You Protect Against It?

Getting too many push notifications for multi-factor authentication? You might be targeted by hackers using MFA fatigue attacks.

By 
Computers passing encrypted traffic 1
OpenSSL Issues Security Updates for Two Critical Vulnerabilities: CVE-2022-3602 and CVE-2022-3786

OpenSSL has issued security updates for critical vulnerabilities CVE-2022-3602 and CVE-2022-3786.

By 
large printing hewlett packard 1
Your Printer Contains Sensitive Data: 4 Ways to Safely Get Rid of It

Looking to get rid of your old printer? It might contain personal details you don't want falling into the wrong hands. So what can you do about it?

By 
Netflix app on a smart TV 1
5 VPNs You Can Use on a Smart TV

If you want to watch Netflix libraries from other territories on your smart TV, you need one of these VPNs.

By 
Gray Door With Keys black hardware 1
How to Install Your Ring Video Doorbell the Right Way

If you have purchased a Ring Video Doorbell for added security, here's the easiest way to install it.

By 
locked laptop and skull flag 1
What Is Screen Locker Ransomware and How Can You Remove It?

Screen Locker is a duplicitous ransomware that locks you out of your device but doesn't necessarily encrypt all your data.

By 
wifi router with padlock on cables feature 1
WEP vs. WPA vs. WPA2 vs. WPA3: Wi-Fi Security Types Explained

There are many types of wireless security but which should you be using? Which Wi-Fi is most secure: WEP, WPA, WPA2, or WPA3?

By 
Robot Machine Technology 1
6 Downsides of Using Artificial Intelligence in Cybersecurity

Is AI smart enough to keep us all safe online—or, like other forms of intelligence, does it come with limitations?

By 
gold bitcoin being split into fragments 1
US Justice Department Seizes $3.36 Billion in Stolen Bitcoin

Billions of dollars worth of Bitcoin have been seized years after it was stolen from the dark web's "Silk Road".

By 
Smartphone with a 3d Bitcoin logo  1
How to Tell If Your Smartphone Is Being Used to Mine Crypto

Cybercriminals can use your phone for malicious ends and eventually damage your hardware. So how can you spot this seemingly-silent attack?

By 
Tor logo seen on purple background  1
How to Access Tor on Your Smartphone

Tor is great for your privacy and security, but how can you access it on your smartphone? It's much easier than you might think...

By 
incogni-featured-image-3 1
What to Do After a Data Breach and How to Protect Yourself

If you find your data has somehow been compromised, you need to act fast. Here's what to do.

By 
39 40 41 42 43
Page 41 / 75