MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 61

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A happy woman shopping online 1
What Is Friendly Fraud and How Do You Prevent It?

Sometimes known as first-party fraud or chargeback fraud, this type of fraud isn't always malicious. Here's what you should know.

By 
The Google Chrome logo against a green background 1
3 Ways to Remove Images From Google Searches

One way to retrieve your privacy is to remove your images from Google searches. But how can you do that? And in what circumstances?

By 
working in an office laptop apple 1
Red Team vs. Blue Team: What’s the Difference?

Red and blue teams are often mentioned in the field of cybersecurity, but what do they actually do? Here's what you need to know.

By 
google logo in eye 1
8 Signs That Your Google Account Has Been Hacked

Google accounts are massive targets for hackers because they unlock so many opportunities. Here's what you need to look out for.

By 
penetration testing security 1
Manual vs. Automated Penetration Testing: What's the Difference?

Penetration testing can be employed both manually and automatically to see if your network can resist cyberattacks, but which is better?

By 
Man Holding iPhone and AirTag 1
Are You Being Stalked? What to Do When You See an “AirTag Found Moving With You” Alert

Did your iPhone just notify you that there is an AirTag found moving with you? Here’s what you need to do to make sure you’re not being followed.

By 
fingerprint secure scanning 1
What Is Fuzzing in Cybersecurity?

Fuzzing is a technique used by both security experts and hackers to find vulnerabilities in software. Here's what you need to know.

By 
camera privacy surveillance 1
What Is User and Entity Behavior Analytics (UEBA)?

Learn in-depth about this relatively new cybersecurity solution that looks for suspicious activity and alerts businesses.

By 
splintered data cells 1
What Is Network Segmentation and How Does It Improve Security?

Imagine the damage a hacker could cause if they got access to your whole system. Fortunately, network segmentation can ease your worries.

By 
Ransomware facts featured 1
It's Back: REvil Ransomware Makes a Return, Here's What to Do

The notorious REvil ransomware gang is back up and running, heralding a new wave of ransomware attacks.

By 
padlocked security device 1
What Is Conti Ransomware and What Makes It Different?

Infamous for taking down large corporations and countries alike, Conti Ransomware has slowly grown in popularity. Here's everything you need to know.

By 
iphone on table 1
Your iPhone Can Be Tracked Even When It’s Powered Off

Did you know you can track your iPhone even when it’s powered off? That sounds like a good thing, but it isn’t always.

By 
house sitting on coins loan money feature 1
What Is a Crypto Flash Loan? How To Prevent Flash Loan Attacks

You can't use it to buy a car or a house, so what's the point of a crypto flash loan?

By 
bitb attack (1) 1
What Is a Browser-in-the-Browser Attack and How Can You Protect Yourself?

A clever phishing tactic steals your login credentials when you sign in using associated accounts like Google and Facebook. Here's how.

By 
setup-windows-sandbox 1
How to Run High-Risk Windows 11 Apps in a Virtual Environment With Hysolate

Why run the risk when you can run apps in a sandbox environment instead? Here's how to use Hysolate to keep your Windows system safe.

By 
Black Girl Texting in Bed 1
10 Effective Ways to Prevent Falling Victim to Smishing Scams

Smishing is extremely common these days, and staying safe from such attacks is imperative. Learn what you can do.

By 
A computer with some code in the screen. 1
Sandboxes, Honeypots, Software Containers: What Do They Mean?

Sandboxes, honeypots, and containers are three popular prevention and analysis technologies. But how do they differ and which should you use?

By 
Man on Video Call 1
Why You Should Never Close Your MacBook if You Have a Camera Cover

Closing your MacBook can damage the screen if you’re using a camera cover. Here’s why and what to do instead.

By 
OneNote logo on top of sticky notes 1
How to Password Protect Your Notes in OneNote

Microsoft OneNote is meant to be the vault for all your information. Let's take a look at how to password protect your notes for optimal security.

By 
what are encrypted messaging apps 1
The 8 Best End-to-End Encrypted Cloud Storage Providers

Looking for a cloud storage service/ Make sure your data is secure with a provider that encrypts all your private information.

By 
59 60 61 62 63
Page 61 / 75