MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 47

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
man in the black clothes with smartphone typing on a laptop in dark room 1
What Is the Man-in-the-Disk Attack?

This scary Android cyberattack uses your external storage to take control over your whole device. Here's what you need to know.

By 
hooded person behind matrix symbols and microsoft exchange logo 1
LockBit Ransomware Deployed via Windows Exchange Server Hack

Cybercriminals have reportedly exploited a Microsoft zero-day vulnerability to hack Exchange servers.

By 
fake dhl website bhl scamming 1
What Is the BHL Parcel Shipping Scam? How to Avoid It

Received an email from BHL? No, it's not a division of DHL. It's a scam. Here's what you need to know.

By 
MacBook in the dark 1
3 Signs Your Mac Is Infected With a Virus (and How to Check)

Is your Mac acting weird? It could be infected with a virus. Here's how to check for a virus on your Mac.

By 
a fishing hook in a blue sea, grabbing onto bitcoin logo 1
How Does a Twitter Crypto Scam Work?

You've likely seen these scams on Twitter, but how does the scam play out?

By 
Image shows a man sitting at a desk using the Google spellcheck and writing in a journal 1
Beware! Spellcheck Features in Browsers Could Risk Your Personal Data

Chrome and Edge's enhanced spellcheck features could be leaking your personal data, including passwords.

By 
login credentials being stolen from laptop via phishing 1
New Phishing-as-a-Service Tool Poses Significant Risks

A new phishing-as-a-service tool is making data theft that much easier for cybercriminals.

By 
An image of a cybersquatter on a laptop 1
Lazarus Malware Targets Tech Jobseekers: Here's What You Need to Know

If you're looking for a job via LinkedIn, you could be targeted by scammers looking to take control of your device and data.

By 
Duo Mobile app logo seen on black background 1
What Is Duo Mobile and Is It Safe to Use?

Duo Mobile is an authenticator app that helps you log into accounts safely. But is it actually secure to use?

By 
a metal wall-mounted CCTV camera 1
7 Reasons You Shouldn't Use Neeva, the New "Tracker-Free" Search Engine

Neeva is the "first private, ad-free search engine" with "no tracking". But does that mean it's safe to use?

By 
Purple phone on purple background 1
What Is a Telephony Denial of Service (TDoS) Attack?

You've likely heard about Denial of Service attacks. But this variant can cripple infrastructure and cost lives. Here's what you need to know.

By 
hp-mfp-printer 1
4 Hidden Security Risks of Printers

Printers aren't usually considered vulnerable, but they can still be a threat to your security and privacy. Here's how.

By 
Mouse pointer hovers over the word security on a screen 1
What Is VoodooShield and How Can It Protect You From Malware?

You can lock down Windows and stop nearly all cybersecurity threats using VoodooShield. So what is it and how does it work?

By 
digital graphic of skull in vector 1
What Is a Hyperjacking Attack and Are You at Risk?

Do you use a virtual machine? You might be targeted using an attack that was seen as theoretical for years before the first confirmed case in 2022.

By 
A black board with Privacy Please written on it 1
How to Know Which Apps Are Using Your Camera and Microphone on Windows 11

How many apps on your Windows 11 PC can see or hear you right now? Here's how to check.

By 
foot print in snow 1
What Is Snowshoeing and Is It Dangerous?

This is a technique used by cybercriminals to scam you via your emails. So what is snowshoeing? How does it actually work?

By 
make your own secure diy rfid door lock system 1
How to Make an RFID Door Lock With a PN532 and D1 Mini

Most off-the-shelf RFID smart locks are easy to bypass. Here's how you can build one with security you can trust.

By 
Brave browser logo juxtaposed against Chrome logo on black background 1
Brave Blocks Irritating Cookie Consent Banners: What It Means for You

If you use the Brave browser, you can maintain your privacy (and stop seeing those annoying GDPR warnings) at the click of a button.

By 
Logos of VeraCrypt, Authenticator, Signal, Linux Tux, Tor Browser, KeePassXC, and File Shredder (left to right) 1
10 Essential Privacy and Security Apps for Linux Desktops

Want to stay and feel secure while using Linux? Here are some essential privacy-focused apps everyone should have on their Linux desktop.

By 
skull and bones in green matrix code 1
BlackByte Ransomware Abuses Legitimate Drivers to Disable Security Measures

Threat actors are using BlackByte ransomware to abuse legitimate servers and bypass security layers.

By 
45 46 47 48 49
Page 47 / 75