MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 68

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A Windows laptop 1
What Is an Identity and Access Management (IAM) Software

Excessive user privilege makes organizations vulnerable to cyberattacks and data breaches. Here's how identity and access management prevents that.

By 
 1
GPS
The 3 Best Android Apps to Catch Someone Unlocking Your Phone

These Android apps take a picture when someone tries to unlock your phone, helping you catch snoopers.

By 
Secured Mobile Phone 1
How Secure Are Sirin Labs' Phones?

Sirin Labs made the "unhackable" Solarin phone, but how secure are Sirin Labs' smartphones really? Can you trust them with your data?

By 
hooded person in mask looking at laptop 1
What Is the Definition of a Data Breach?

You'll have heard the terms "data breach" and "data leak", but what are their meanings? Breaches happen all the time: here's what you need to know.

By 
Protecting Critical Infrastructure Like Nuclear Power Plants From Cyberattacks 1
Why Hackers Target Critical Infrastructure and Why It's Difficult to Upgrade Cybersecurity

Hackers target out key infrastructure, but why? Is it really worth their time? And why aren't critical systems upgraded more often?

By 
Woman on Laptop 1
8 Data Privacy Habits to Practice for Protecting Your Personal Information

You shouldn't freely give away your personal information, especially on the internet. So, here are some habits you should practice when online.

By 
routers vs switches 1
The Easy Guide to Updating Your Router Firmware

It's the main portal to the internet in your home, so ensuring it's updated and secure is vital.

By 
trojan-virus-android 1
How the Android.Spy.4498 Trojan Steals Your WhatsApp Data (and How to Beat It)

It imitates WhatsApp, so most users won't even know it's a Trojan.

By 
a protected computer network 1
What Is Data Execution Prevention and How Does It Work?

Microsoft Windows offers a set of Data Execution Prevention (DEP) security checks to protect your computer. Learn what it is and how to enable it.

By 
company merger deal signed in the boardroom 1
What the Zimperium and Carahsoft Partnership Means for Mobile Security

Zimperium, a leading mobile security provider for government and enterprises, is now providing protection to the public. Here's what they offer.

By 
1password World Password Day 1
World Password Day: Get $20 for 1Password Families Plan Now

For World Password Day you get to enjoy a great deal for 1Password Families to protect your entire home.

By 
Google Search on phone 1
What Is Google Dorking and How Hackers Use It to Hack Websites

Hackers sometimes rely on Google dorking to hunt for sensitive information like usernames, log files, etc. Learn all about it to keep your site safe.

By 
Netflix open on tv 1
Using a VPN for Netflix: Is It Legal? Is It Moral?

Is it legal or morally correct to use a VPN for Netflix? Let's find out.

By 
NordPass deal 1
NordPass Deal Saves You Up to 70% on Subscription

NordPass is now available for a great price. Once you subscribe, you'll save a ton of brain cells by having it remember passwords for you!

By 
Earn passive income using your computer and internet connection 1
What Is Honeygain? Is It Legit? How It Works and What You Need to Know

Honeygain lets you share your remaining internet bandwidth and get paid for it. Here's what you need to know about it.

By 
cryptocurrency bitcoin next to wallet 1
Are Custodial Crypto Wallets a Security Risk?

Here, we'll discuss why you should think twice before using a custodial crypto wallet to store all your funds.

By 
 1
What Is Doxxing, Is It Illegal, and How Do You Protect Yourself From It?

Doxxing is becoming increasingly commonplace. But what exactly is doxxing and can you protect yourself against it?

By 
Touch Screen Device 1
How to Protect Your Network From Insider Threats

Insider threats can be intentional or accidental; either way, they can cost you money and your reputation. Here's how to fight back.

By 
wifi logo next to shanghai skyline 1
Is It Safe to Connect to Public Wi-Fi in China?

What is internet access like in China? If you're visiting the country, is it safe to connect to public Wi-Fi networks?

By 
erase-twitter 1
How to Delete All of Your Tweets: 4 Ways

Many people often find their old tweets come back to haunt them. To avoid the same fate, you may want to delete your tweets.

By 
66 67 68 69 70
Page 68 / 75