MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 51

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Picture of a grey 3D cube 1
What Is Grey Box Penetration Testing and Why Should You Use It?

Grey box testing is one way organizations are raising their defenses against cyberattacks. Is it time for your team to do the same?

By 
Microsoft Edge browser logo on a laptop screen 1
Oops: Microsoft Edge Just Served Up Malicious Ads to Its Users

The browser was caught showing bad ads in its News Feed that directed people to a fake malware attack page.

By 
coinbase logo in front of blue graph 1
What Is the Coinbase Text Scam and How Can You Avoid It?

You might have heard about the cryptocurrency Coinbase phishing scam sent out via SMS. So what is it? And how can you stay safe?

By 
Man Holding Laptop Computer With Both Hands 1
How Do Hackers Find Out Who to Hack?

How do cybercriminals find out which devices are vulnerable? Why are you targeted by hackers? Here's how hackers work and how to protect yourself.

By 
hacker using an iPhone 1
Don't Remove Your Lost iPhone From Your iCloud Account: Here's Why

A lost or stolen iPhone that's connected to iCloud is almost as useless as a slab of metal to criminals.

By 
Close-Up View of System Hacking 1
The 7 Stages of Hacking Explained

How do cybercriminals find out who to hack? And how do they actually hack a system and steal data? Here's what you need to know.

By 
opening popular messenger on smartphone 1
How to Set Up and Use Two-Step Verification on WhatsApp

Make your WhatsApp account even more secure.

By 
California map and Bear seen on yellow background with the letters CCPA 1
What Is the California Consumer Privacy Act (CCPA)?

It's not just GDPR that protects some internet users. So here's everything you need to know about the California Consumer Privacy Act (CCPA).

By 
black and white wordpress graphic 1
WordPress Plugin Vulnerability Abused in Zero-Day Exploit

The WPGateway premium WordPress plugin has been exploited by malicious actors.

By 
man typing on computers two monitors 1
Do You Still Need Antivirus Protection Software?

Antivirus suites protect you from malware, but they have their disadvantages too. So do you need an antivirus on computers and smartphones?

By 
A Windows Security scan notification  1
A Quick Windows Security Guide for Windows 11

Want to get quickly accustomed to Windows Security on Windows 11? We've got you covered.

By 
Waterfox browser logo seen on light blue background 1
What Is Waterfox and Is It Safe?

Looking for a secure, private alternative to popular browsers like Chrome and Edge? Waterfox might win you over...

By 
blue matrix background behind steam logo 1
Steam Accounts at Risk in New Browser-in-Browser Attack

Malicious actors are now using a new technique to get their hands on Steam account credentials.

By 
Silhouette of a man with faded Wi-Fi symbol is seen on green background  1
What Is De-Anonymization and How Can You Prevent It?

The data collected by various services about you is often made anonymous before being sold on. So you don't have to worry about your privacy... right?

By 
Spyro Reignited Trilogy title screen on yellow Nintendo Switch Lite 1
How to Secure Your Nintendo Account on Your Switch

Here's how to enable two-factor authentication for your Nintendo Switch, plus other key ways to secure your Nintendo account.

By 
being arrested police 1
5 Reasons Not to Install a Free Phone Tracker App Without Permission

Looking for the best free phone tracker app to use without someone's permission? You might want to reconsider...

By 
hacking hackers deleting files 1
What Are Threat Actors and What Do They Want?

You might have heard the term, "threat actor", but what does it mean? Why do they threaten your online security? And how can you protect against them?

By 
Linux, macOS, and Windows icons 1
What Is the Most Secure OS? 5 Secure PC Operating Systems to Consider

Which is the most secure operating system? Here's a run down to help you decide which OS is the right one for you.

By 
coding programming encryption 1
Is Bluetooth Secure? Understanding Bluetooth Security and Attack Methods

Can Bluetooth be hacked? Here's what you need to know about how cybercriminals can target you using Bluetooth.

By 
facebook-hacker 1
Has Your Facebook Been Hacked? How to Tell (And Fix It)

Learn how to tell if your Facebook account was hacked, what to do if it was, and how to prevent being hacked.

By 
49 50 51 52 53
Page 51 / 75