MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 52

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
An image of an open white box 1
What Is White-Box Penetration Testing?

Are you looking to nip security problems in the bud? White-box pentesting could be the key.

By 
coin-base-alert 1
Have You Been Hit by the Coinbase Email Scam?

Do you invest in cryptocurrency? You're a big target for cybercriminals. So what is the Coinbase phishing scam? What should you look out for?

By 
Cartoon hand coming out of a laptop screen catching a ladybug 1
What Are the Risks of Remote Computer Access?

More individuals and companies are using remote access programs, but they do come with security risks. So what can you do to protect yourself?

By 
hacking into bluetooth laptop smartphone coding 1
11 Bluetooth Attacks You Need to Know About

No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices.

By 
A keyboard with a love heart on the enter key 1
How to Protect Your Privacy While Online Dating

Online dating can leave you vulnerable to privacy risks. Here, we explain how to stay anonymous and protect your privacy on popular dating apps.

By 
QR Stickers on a Metal Pole 1
What Is QRishing and How Can You Avoid It?

Do you scan every QR code you see? This clever phishing scam might make you think twice...

By 
image of nebula behind malware graphic 1
Hackers Exploit James Webb Telescope Image to Spread Malware

One of the stunning James Webb telescope images is now being used by malicious actors to spread malware among devices.

By 
Smartphone juxtaposed against a blurred image of fast food 1
DoorDash vs. UberEats vs. GrubHub: Are These Food Delivery Apps Safe?

Food delivery services might offer great meals, but they might not be all they're cracked up to be—especially when it comes to how secure they are.

By 
CamScanner logo seen on light green background 1
Is CamScanner Safe to Use? Here's What You Need to Know

CamScanner is a popular document scanning app, but does it collect data about you? Is it secure? And should you use it for your private information?

By 
black and white photo of tiktok app on smartphone 1
TikTok Denies Security Breach After Claims It Has Been Hacked [UPDATED]

TikTok has denied claims that it has suffered a massive data breach, though speculation is still running rife.

By 
Photo of someone using Facebook on their laptop 1
How to Spot Fake Profiles on Facebook

Fake profiles are a problem on Facebook. Here are several red flags to look out for so you don't get scammed.

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
How to Fix the Behavior:Win32/Hive.ZY Alert on Windows Defender

Running Windows 10 or 11 and seeing the Behavior:Win32/Hive.ZY alert appear? Here's why it's happening and how to fix it.

By 
Wickr app logo is seen on an image showing a man holding a smartphone 1
Is Wickr Secure? How the Encrypted Instant Messenger App Works

Wickr promises end-to-end encryption on your instant messages and much more, so is it secure to use? How does it compare to other instant messengers?

By 
Photo of a Boat House 1
Is This Airbnb a Scam? 4 Ways You Can Tell

Airbnb's popularity naturally means it's a haven for scams. So how can you spot common scams on the rental service? Here's what to look out for.

By 
broken samsung phone lying on cracked concrete 1
Samsung Suffers Another Massive Data Breach: Should You Be Worried?

For the second time in 2022, Samsung's suffered a data breach. Though the company seems very relaxed about it, you need to know what was compromised.

By 
cybersecurity lock 1
How to Block Users from Installing Software on Your Windows Computer

"Resistance is futile...." is not something you'll want to hear from a PC. When too many people access your computer, it's best to restrict the Windows Installer. We show you how.

By 
media sharing plex image 1
How to Make Your Plex Server More Secure Using a Simple Domain Name

If you run a Plex media server, your connection might not be secure from hackers. Fortunately, it's very simple and cheap to fix this problem.

By 
Hacker at a desk laptop 1
How Hackers Targeted Politicians With a Fake News Site

Hackers used a tried-and-tested phishing scam to deploy malware. So who was targeted? By who? And what did they actually do?

By 
HTML login form authentication code 1
Implementing User Authentication in Express Apps

You can protect genuine users from malicious ones by authenticating them. Make sure you use best practices to avoid leaving any security holes.

By 
logi camera watching 1
How to Disable the Webcam in Windows 11

Stop hackers from peeking in by disabling the webcam on Windows 11.

By 
50 51 52 53 54
Page 52 / 75