MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 48

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
red and blue digital lock graphic 1
The 7 Most Common Causes of Data Breaches

Someone can hack a server, but there are much easier ways to gain access to the same information. Here's what to look out for to keep your data safe.

By 
timing money flip credit cash 1
Don't Be Fooled By the Cash App Money Flip Scam

Money flip scams are becoming more prevalent online. Here's how to spot and avoid the Cash App money flip scam.

By 
android logo in front of matrix background 1
New "RatMilad" Android Malware Can Steal Data and Spy on Victims

A new kind of Android malware is being used against victims on smartphones to spy and steal data.

By 
hooded person and fractured background behind discord logo 1
Hackers Exploit Beeple Discord Server to Drain Wallets

The Beeple Discord server has been hacked by malicious actors attempting to drain user wallets.

By 
Silver and black round emblem of bitcoin on a keyboard  1
What Is the CryptoTab Browser? Is It Safe to Use?

Free Bitcoin in your browser? Sounds too good to be true, right?

By 
iHerb logo seen on green background 1
Is iHerb Legit and Is It Safe to Shop There?

iHerb is a large online retailer, no more or less trustworthy than other large online retailers.

By 
Mockup of a Laptop Placed on Table Showing a Pop-up of Adware  1
What Is the Dipladoks.org Redirect Malware? How to Remove It on Windows

If Dipladoks.org keeps popping up in Windows, here's how to fix it.

By 
Lock and asterisks seen over a photo of a server room 1
What Is the Best Enterprise Password Manager?

Looking for the best password manager for your business? Here are the top options, no matter your budget.

By 
Google Chrome logo, programming icon, and puzzle piece icon on an orange gradient 1
Could an Upcoming Google Chrome Update Break Your Ad Blocker?

Ad blockers are set to change thanks to an upcoming update to Google Chrome and Microsoft Edge.

By 
graphic of nft word in front of circuit board 1
Can You Hide Data in an NFT?

Can something be hidden within an NFT? Here's what you need to know about steganography in the age of digital art.

By 
map show location dots 1
What Is Shodan and How Can It Improve Your Online Security?

Shodan can be used by hackers to target your devices, but it's not all bad. In fact, it can help you protect from cybercriminals too.

By 
disable modern standby Windows 11 1
How to Turn On System Protection for Drives on Windows 11

Here's how to quickly and easily turn on System Protection for a drive on Windows 11.

By 
harley quinn cosplay with a baseball bat 1
What Is Harly Malware on the Google Play Store?

This Trojan malware silently signs you up to expensive subscription services to empty your bank account. Here's what you need to know.

By 
a student next to school laptop with a teacher on the screen 1
Why Google Is Banned From Danish Classrooms

A school gave an eight-year-old a YouTube account without his parent's permission—now Google is banned from Danish classrooms. Here's why.

By 
person being scammed by criminal via laptop 1
What Is Consent Phishing and Why Is It Dangerous?

Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?

By 
Correct symbol seen on a faded shield on blue background  1
What Is Real-Time Protection, and Why Is It Important?

Real-time protection functions as an additional layer of security between your PC and infectious software. But is it enough to keep you safe?

By 
pile of paperclips behind alert symbol 1
How to Spot and Avoid Malicious Attachments

Malware can be spread via email attachments, but what are the tell-tale signs of a malicious attachment? Here's what to look out for.

By 
swap a sim laptop apple macs 1
What Is SIM Jacking and What Can You Do to Protect Yourself?

This scary scam can lead to identity theft, and you might not even know it's happening to you. Here's what you need to know.

By 
A-Private-sign 1
7 Reasons Privacy Should Be Considered a Human Right

Keeping your data safe from prying eyes matters regardless of how you feel about targeted ads or whether you have something to hide.

By 
Man on Computer 1
What Is Container Security and Why Do You Need It?

Using software in containers is an important step in securing your online environment. So how does container security work?

By 
46 47 48 49 50
Page 48 / 75