MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 60

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Various digital data storage devices. Usb sticks, external hard drive, SD cards, mini and micro SD cards, laptop and smartphone 1
How to Protect Removable Drives With BitLocker To Go

Here's how to keep your portable drives secure with Windows' BitLocker To Go feature.

By 
An upclose image of the back of a student's head while he's in school 1
How Can We Protect Teachers From Cyberattacks?

Cybercrime has impacted not only students but also teachers in recent years. So, what can educational institutions do about it?

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
Is Microsoft Defender Good Against Ransomware? Definitely, Says AV-TEST

The institute gave the antivirus full marks for its effectiveness in stopping ransomware attacks.

By 
ghosting smartphone public 1
5 Ways Hackers Use Public Wi-Fi to Steal Your Identity

Love using public Wi-Fi? So do hackers! Learn how cybercriminals can access your private data while you use public Wi-Fi.

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
What Is the Microsoft Defender Application Guard and How Do You Enable It?

Microsoft Defender has become an excellent choice for the average user, and its application guard adds even more security.

By 
person-holds-white-bluetooth-earbuds-in-hands 1
Bluejacking vs. Bluebugging vs. Bluesnarfing: What's the Difference?

Your devices are open to Bluetooth attacks, but what do the three main Bluetooth attack types actually mean? How can you stay safe?

By 
Computer code on a screen with a hooded person  1
The Best Antivirus Apps for Windows 11

Keep your Windows 11 PC safe with these free and paid antivirus apps.

By 
doctor typing on a laptop besides stethoscope 1
Is HIPAA Privacy a Federal Law?

Learn what the HIPAA Privacy Rule actually covers and how state regulations can impact it.

By 
A Windows Security scan notification  1
How to Set Windows Security Exclusions in Windows 11

If Windows 11 is blocking an app, don't fret. It's really easy to make an exception and let your favorite programs through.

By 
skull in code next to water droplets 1
What Is Leakware? Here's What You Need to Know

Leakware is ransomware with an extra-scary caveat. So what is it? And how can you protect yourself from cybercriminals using leakware?

By 
person holding phone with instagram logo 1
How to Make Your Instagram More Private: 8 Useful Tips

If you're worried you're sharing too much on Instagram, here are some tips to help you enjoy a more private Instagram experience.

By 
Facebook and Meta icons 1
4 Things to Know About Meta's New Privacy Policy

Meta is rolling out another privacy policy update. Here's what you should know about it.

By 
A 3D image of a brain in blue, purple, and pink ombre 1
LaMDA: Is Google's Sentient AI Real?

Don't let Google's controversial AI fool you.

By 
two women leaning over a wooden table and signing papers 1
How Does an NDA Protect Your Data?

What's the definition of an NDA? What's the difference between an NDA and a confidentiality agreement? Here's what you need to know.

By 
person using phishing hook on man using laptop 1
What Is Double Barrel Phishing and Is It Dangerous?

Most people are aware of phishing scams. That's why cybercriminals are increasingly moving onto double barrel phishing. Here's what you need to know.

By 
Near Field Communication smartphones 1
How Does a Drive-By NFC Hack Work?

What is NFC, why is it on your phone, and does it present a security risk? Here's everything you need to know.

By 
Samsung Knox featured image 1
What Is Samsung Knox? How Does It Protect Your Privacy?

Samsung Galaxy phones feature the Samsung Knox security system. But what is it, can you trust it, and can it be hacked?

By 
upclose image of a black tesla steering wheel next to a GPS navigation screen 1
Bluejacking: How Bluetooth Can Be Used to Hack Your Devices

Cybercriminals can target you through Bluetooth-enabled devices, from your earphones to fitness trackers, and even your Tesla. Here's how.

By 
Windows Firewall Allow Featured 1
What Are the 5 Main Types of Firewall?

Choosing the right firewall is imperative to ensure you get the security you need.

By 
iPhone map showing pinpoints 1
iOS
Your iPhone Has a Hidden List of Everywhere You Hang Out

Did you know your iPhone keeps a secret list of all the places you frequently visit? Here’s what you need to know.

By 
58 59 60 61 62
Page 60 / 75