MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 57

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
looking after children privacy security 1
7 Reasons Why Childcare Apps Are Dangerous for Your Security

Do you use a daycare app? It might be a risk to you and your child's privacy. Here's what you need to know.

By 
linux logo in front of red code background behind translucent alert symbol  1
Linux Malware Found to Be at an All-Time High in 2022

Linux malware reached an all-time high in the first half of 2022, with nearly 1.7 million samples discovered.

By 
no location access granted using linux 1
6 Privacy Benefits of Using Linux

Open-source Linux distributions maintain your privacy better than proprietary operating systems. But how?

By 
Brave browser logo is seen on colorful background resembling sunset 1
5 Proven Ways to Enhance Your Security and Privacy In Brave Browser

Although Brave is a privacy-focused browser, you can further improve your experience by taking extra security measures.

By 
illustration of remote access 1
The 10 Best Ways to Secure Remote Access

As remote work gets more popular as time goes by, businesses should do everything they can to secure remote access for their employees.

By 
login details stolen by phishing hook on laptop 1
New "Ducktail" Phishing Campaign Targets Facebook Business Accounts via LinkedIn

Employees managing Facebook Business accounts are now being targeted via LinkedIn in a spear phishing campaign known as "Ducktail".

By 
Image depicting servers in a cloud background. 1
How Russian Hackers Use Google Drive and Dropbox to Evade Detection

Learn how threat actors exploit legitimate cloud services and what you can do about it.

By 
hacker in black hoodie and mask in front of a laptop pointing at the camera 1
Your Server Can Be Hacked: Here’s How

How are servers hacked? How can you tell if a server has been hit by cybercriminals? Here's what you need to know.

By 
child at keyboard programming 1
7 Kinds of Software You Should Always Check for Security Updates

Forgetting to download a security update can lead to serious headaches. Here are the types of software you need to keep updated at all times.

By 
 1
How to Check Whether Your Computer Has Malware

Computer viruses throw up symptoms which could be indicative of a range of different problems. Not certain if your computer has a virus or other malware? Here are some telltale signs.

By 
Padlock on a laptop keyboard to represent file encryption 1
What Is Steganography and How Does It Work?

You can hide secret messages in plain sight. But how? Here's what you need to know about the cryptography technique called steganography.

By 
sign in macbook 1
How to Reset Your Apple ID Password: 6 Simple Ways

Forgot your iCloud or Apple ID password? Here’s how to recover your account if you’ve forgotten your password and can’t log in.

By 
person using MacBook Pro retina with Touch Bar 1
How to Improve the Privacy of Your Mac

Follow these tips to ensure your Mac is as private as possible.

By 
Black Lady Working 1
The 10 Best Practices to Secure Your Workstation

With these effective practices, cybercriminals will struggle to find entry points into your network.

By 
password-protect-folders 1
How to Password Protect a Folder in Windows

Need to keep a Windows folder private? Here are a few methods you can use to password protect your files on a Windows 10 PC.

By 
A purple team working in a room 1
What Is a Purple Team in Cybersecurity?

You might have heard of the numerous cybersecurity teams working behind the scenes of a business. So what does a purple team actually do?

By 
Man Working on a computer at home 1
What Is Single Sign-On (SSO) and What Are Its Benefits?

Single sign-on (SSO) is of utmost importance in cybersecurity as it minimizes the entry points for hackers.

By 
cyberattacker on laptop 1
What Is a Gray Hat Hacker?

You may have heard of black and white hat hackers, but what does a gray hat hacker do? Let's find out.

By 
 1
Create a CAPTCHA Validation Form Using HTML, CSS, and JavaScript

Secure your websites with CAPTCHA validation.

By 
padlock in data swarm 1
Why VPN Services Are Shutting Down Their Indian Servers

VPN services are up in arms against a new law introduced by CERT-In. Learn how it compromises users' privacy and how VPN companies are reacting to it.

By 
55 56 57 58 59
Page 57 / 75