MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 59

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
uber driver holds steering wheel as she drives down the road 1
6 Tools and Technologies That Enhance Safety of Uber Drivers

Ride-hailing apps like Uber are pretty good at ensuring the riders' safety, but what about the drivers? What can they do to stay safe on the road?

By 
frustrated computer user 1
What Is Password Fatigue and How Can You Prevent It?

Password management can cause fatigue, especially if you have too many online accounts.

By 
North Korean dictator Kim Jong Un graphic with crypto logos in background 1
What Is the Lazarus Group? Is It Really Comprised of North Korean Hackers?

Suspected to be funded by the North Korean government, the Lazarus Group poses a threat to the whole world.

By 
Windows computer displaying Windows Security's Add an exclusion button 1
How Do You Whitelist Files in Windows Defender?

Microsoft's Windows Defender can flag certain trusted files as threats and prevent you from using them. Here's how you can avoid it.

By 
@ symbol 1
What Is Vendor Email Compromise and How Can You Protect Against It?

Everyone should know about this variation of a typical phishing scam—which can lose you money and damage your reputation.

By 
employees working together in an office 1
What Is Third-Party Risk Management and Why Is It Important?

Many businesses today rely on third parties for various tasks, but this could be a bad idea without proper risk management.

By 
Lock on a keyboard with Linux Tux 1
6 Reasons Why Linux Doesn’t Need an Antivirus or Firewall

Linux is more secure than other operating systems. But that's not the only reason why you might not need an antivirus or firewall while using Linux.

By 
red world map behind green binary code  1
The Top 4 Ways That Malware Spreads

You should've heard about the devastating effects of malware, but how can it actually spread between devices?

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
How to Scan Removable Drives With Microsoft Defender

If you use a USB drive on different PCs, it's important to ensure you aren't spreading viruses amongst them.

By 
Facebook logo 1
How to Recover Your Facebook Account When You Can't Log In

Forgot your password? Were you hacked? Here's how to recover your Facebook account using proven Facebook account recovery options.

By 
Sample of Android launchers  1
Are Third-Party Android Launchers Safe to Use?

Installing a launcher is one of the easiest ways to customize an Android phone. But are they safe? Here's what you need to know about launchers.

By 
skull and bones logo on phone screen 1
What Is Madware and How Can Your Protect Against It?

Malware, including adware, doesn't just target your PC and laptop. Madware in particular is aimed at your other devices. Here's how to avoid it.

By 
hard drive plugged into a laptop 1
How to Enable Auto-Unlock for BitLocker Drives

There's no need to manually unlock your BitLocker drives every time you want to use them. Here's how to set them to automatically unlock on your PC.

By 
person connecting to remote servers using SSH 1
Everything You Need to Know About the Twofish Encryption Algorithm

Many believe Twofish is more secure than AES, the most popular encryption algorithm in the world.

By 
Computer code on a screen with a hooded person  1
What Is the YTStealer Malware and What Does It Do?

This malware can steal your YouTube account and sell it on the dark web. Here's what you need to know about YTStealer malware.

By 
bitcoin logo with key unlocking wallet feature image 1
How to Store Your Crypto Credentials in 1Password

If you want to secure your cryptocurrency wallet credentials, 1Password has the solution.

By 
Soldiers boarding a jet 1
What Is the US Cyber Command?

You may have heard about the US Cyber Command, but what purpose does it serve? Here's everything you need to know.

By 
Image of code on a computer monitor 1
What Is a Managed Security Service Provider?

Most businesses today outsource the management and monitoring of security systems for a number of reasons.

By 
chrome-network-1 1
Google Patches Chrome to Tackle a Dangerous Zero-Day Exploit

Google has wasted no time in preventing another zero-day exploit with its fourth Chrome patch of 2022. 

By 
bitcoin lying on hundred dollar bill  1
Can You Really Speed Up a Bitcoin Transaction Using an Accelerator?

Surely Bitcoin transaction accelerators are a scam?

By 
57 58 59 60 61
Page 59 / 75