MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 69

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
phone screen with a Facebook icon with a red notification icon 1
What Is the Facebook Protect System and How Do You Activate It?

If you want to keep your Facebook account secure, you might be able to try out Facebook Protect. Here's what it is and how to use it.

By 
vpn app on laptop screen in office 1
What Are VPN Logs and Are They a Security Risk to You?

Virtual Private Networks are supposed to keep your data anonymous. But that's not always the case. Here's why VPN logs are so bad.

By 
Blurred house on Google Maps Street View 1
Why You Should Blur Your House on Google Street View (and How)

Shocked to learn that your house is on Google Maps' Street View feature? Here's how to blur out your house on Google Maps and stay private online.

By 
A Windows 11 PC 1
6 Reasons Why You Should Never Use a Pirated Copy of Windows

Microsoft lets you use an unactivated copy of Windows with limitations, but isn't pirating it better? As it turns out, it's really not.

By 
Lock on a laptop 1
3 Amazing Software to Lock and Hide Your Folders in Windows

Want to keep your files secure? Then grab one of these security programs for Windows and hide them away from prying eyes.

By 
 1
How Are Fake Live Video Calls Made? Here's How to Spot Them

Concerned that people are making fake video calls? Want to prank a friend? Here's how to make or spot a fake video call.

By 
Emergency lights on a police car 1
What Are Fake Emergency Data Requests?

Cybercriminals can fake an emergency data request to steal user information from tech companies. Here's everything you need to know.

By 
New features on Telegram 1
Why EU's Interoperability Requirement Threatens Encryption Security

EU's interoperability requirement for messaging apps could potentially weaken the end-to-end encryption you enjoy on top platforms.

By 
smashing drive with a hammer feature 1
How to Securely Erase Your SSD Without Destroying It

SSDs can only be written to a limited number of times. Then how can you securely erase your SSD? Here's what you need to know!

By 
a tablet, a map, sunglasses, and photographs lying on a surface 1
Does Your Windows 11 Device Need a Third-Party Antivirus?

Windows 11 comes packed with some tough security measures, but are they enough?

By 
Hacking Message on Laptop 1
Is Ethical Hacking Legal or Illegal?

Not all hackers are bad! White-hat, or ethical, hackers find vulnerabilities before cybercriminals can exploit them. But is ethical hacking legal?

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
How to Scan a Single File or Folder With Microsoft Defender

Want to scan a single file or folder without performing a full scan? Here's how to do it with Microsoft Defender.

By 
blue underwater image with lots of small bubbles 1
What Is Water Cybersecurity?

Water has become the next target for cyberattacks. No, really. Here's everything you need to know about water cybersecurity.

By 
a round white security camera attached to a pole 1
Does Public Service Automation Infringe on Your Privacy?

Many governments already employ artificial intelligence and are investigating further uses. So is AI a threat to your privacy and security?

By 
microsoft edge logo 1
Microsoft Edge May Soon Make Third-Party VPNs Redundant for You

The tech giant is working on a free private network for its browser that may make you reconsider paying that VPN bill.

By 
vpn map on laptop screen outside 1
Free vs. Paid VPNs: Which Should You Choose?

With many providers offering VPN services free of charge, is it worth spending money on a top VPN? Learn what you get for the price.

By 
Man Operating Computer 1
What Is Cybersecurity Mesh and Why Is It Important?

Cybersecurity mesh provides a slew of benefits. Here, we'll uncover them and list the factors you should consider while implementing this strategy.

By 
Pages, Keynote, and Numbers app icon 1
How to Add a Password to Pages, Numbers, and Keynote Documents on iPhone

Protect your iWork documents with a password using this nifty trick on your iPhone or iPad.

By 
buy microsoft office 1
How Does Azure Protect Microsoft Office 365?

Microsoft Azure expands the security capabilities of Office 365 with its robust feature set. Learn all about it here.

By 
Smart-device-using-maps 1
How to Track Your Child's Phone and Keep Them Safe

Are your kids always out of the house? Ensure their safety and ease your mind by following this tutorial on how to track your child's phone.

By 
67 68 69 70 71
Page 69 / 75