MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 58

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
apple and alert symbols on laptop screen 1
New "CloudMensis" Mac Malware Uses Cloud Storage to Steal Data

Researchers have discovered a new kind of malware that's being used to exploit macOS devices and steal private user data.

By 
Apple Passkeys homepage for developers 1
How Do Apple Passkeys Work? How Do They Keep You Secure?

Are you ready to say goodbye to traditional username and password combinations? Apple might just have the answer.

By 
Close up image of a HTTPS web address 1
SSL
How to Set Up a Free SSL Certificate on WordPress

If you're looking to add some extra security to your WordPress site, here's how to set up a free SSL certificate. We'll cover two methods.

By 
alert symbol in front of crypto statistics on smartphone 1
The FBI Warns Crypto Investors to Watch Out for Fraudulent Apps

The FBI is warning of fraudulent cryptocurrency apps that have stolen millions from investors.

By 
person taking fingerprints using inkpad 1
What Is Contactless Fingerprinting, and How Does It Work?

Could contactless fingerprinting herald the dawn of a new era of secure authentication?

By 
shape of skull in computer code 1
5 Key Types of Computer Worms You Should Know

Based on the mode of propagation, computer worms usually fall into one of these five types.

By 
photo of a girl using her phone 1
The 10 Best Ways to Share Your Files Securely

Stay safe from hackers by following these effective practices while sharing files.

By 
Two monitors on a desk 1
12 Resourceful OSINT Tools You Should Know

Open-source intelligence gathering can be a lot easier with these valuable tools you can use for free.

By 
WhatsApp and Signal logos are seen on a yellow background  1
WhatsApp vs. Signal: Which App Provides Better Security and Privacy?

WhatsApp and Signal are two of the most popular messaging apps in terms of security, but how do they stack up? Let's find out.

By 
A smartphone with apps shown on screen  1
Avoid These 3 Types of App if You Care About Privacy

You can't always trust smartphone apps with your data. Here are the types of app you need to avoid and why.

By 
phishing hook stealing email on laptop  1
The Top 7 Signs of a Phishing Scam

How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.

By 
Logos of Firefox, Pale Moon, Tor and Brave browser are seen on a black background 1
What Is the Most Secure Browser for Windows?

You're likely viewing this using Google Chrome, but that's not necessarily the most secure or private browser. Here are some great alternatives.

By 
close up shot of intel chip on motherboard 1
Researchers Find New Spectre Vulnerabilities in Older AMD and Intel Chips

Researchers have found two additional Spectre security vulnerabilities in older models of AMD and Intel processing chips.

By 
windows xp password reset feature 1
How to Update the BitLocker Password on a Protected Drive for Windows

Why remove and re-add the security when you can just tweak the BitLocker password on the fly?

By 
types of security defense firewall feature image 1
What Is a Firewall? How Does a Firewall Work?

A firewall is a vital part of any computer security setup. Here's what you need to know.

By 
too many advertisements on smartphone 1
Seeing Overly Personal Ads Online? 3 Ways to Make Them Stop

Here's how to disable personal ads on Google, Twitter, and Facebook, doing all you can to stay anonymous online.

By 
office 365 menu behind alert logo 1
Microsoft Warns of AiTM Phishing Attacks Affecting Over 10,000 Organizations

Microsoft is warning users of a large-scale AiTM phishing campaign that has targeted tens of thousands of organizations since September 2021.

By 
asian-woman 1
9 Common Myths About Working in Cybersecurity

As a relatively new career field, cybersecurity is plagued with discouraging myths. So, let's clear the air.

By 
Man Talking on the Phone 1
7 Effective Tips for Ransomware Negotiations 

Learn how to negotiate with the hackers to pay as little ransom as possible.

By 
robin singing on branch 1
Researchers Warn of a Dangerous Raspberry Robin Worm Targeting Windows Users

Windows users need to be aware of a Raspberry Robin worm being spread via USB devices.

By 
56 57 58 59 60
Page 58 / 75