MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 70

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A padlock sitting on a laptop 1
8 Remote Work Security Mistakes You Should Avoid

Working remotely exposes you to several potential security risks. Learn how to avoid these remote work security missteps.

By 
Black Woman in Office 1
What Is API Security and How Does It Work?

API security lets you protect your apps and software, which is crucial for businesses. Here, you'll learn why it's important.

By 
Password Towfiqu Barbhuiya Unsplash 1
Protect Your Privacy With These 5 Opera Add-Ons

If privacy is important to you when online (as it should be), here are five add-ons you can use to protect yourself in the Opera browser.

By 
padlock in front of shield and binary 1
What Is Threat Intelligence and How Does It Work?

Threat intelligence is crucial to protect businesses from cyberattacks. Here's everything you need to know.

By 
Lock on a laptop 1
8 Best API Security Practices to Safeguard Your Network

APIs help you bolster your network with the proper security measures. Here, we'll discuss multiple ways to about it.

By 
scammer sending fake Amazon email on his computer 1
How Scammers Use Fake Amazon Emails to Steal Money

Got an email from Amazon that claims you've bought something that you haven't? It could be a scam. Here's how it works and what to do.

By 
Keeper Security 1
Looking For a Password Manager? Here's Why You Should Choose Keeper

If you need a new password manager, Keeper Security should be the first option you check out.

By 
upload download data cloud laptop 1
What Is a Cloud Access Security Broker?

How do you protect your data in the cloud, even from inside threats who access content remotely without authorization? You need a CASB.

By 
printer on desk by wall 1
Can Your Printer Be Hacked?

Your network is only as secure as its weakest device. So if you have a network-connected printer, you have to keep it protected too.

By 
initial access broker 1
What Are Initial Access Brokers?

These hackers give other criminals access to vulnerable networks by selling stolen credentials on the dark web.

By 
pepper-in-shaker 1
What Is Peppering in Password Security and How Does It Work?

You've probably heard about salting passwords, but a further technique, peppering, makes them even more secure. Here's how.

By 
shared computers in an office 1
7 Things You Shouldn't Do on a Shared or Public Computer

If you have no other choice but to use a shared computer for whatever urgent reason, here are some things you should never do while using it.

By 
VPN icon and servers dotted across the world 1
VPN
The 5 Types of VPNs and When to Use Them

Virtual Private Networks fall into several categories. We take a look at five most common VPN types, how they work, and when to use them.

By 
vpn diagram photo with red circle surrounding government logo 1
VPN
Can Governments See Who's Using a VPN?

Are VPNs completely safe as advertised? Does the government know you're using a VPN? Here's everything you need to know.

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
Windows Has Built-In Ransomware Protection—Here’s How to Keep Your PC Safe

Unbeknownst to many Windows users, Microsoft offers built-in ransomware protection. Learn how to use the feature to protect your PC.

By 
TikTok logo on a mobile phone 1
The TikTok Privacy Concern You Don't Know About: Data Mining

You'll be surprised to know the amount of data TikTok has about you.

By 
An illustration of a person hacking a computer 1
What Is a Backdoor Virus? How to Protect Against Backdoor Viruses

Backdoors aren't necessarily a bad thing, but they can be used for ill by cybercriminals. Here's what you should know.

By 
 1
How to Hide Your Online Status in WhatsApp

Want to restore some privacy to your instant messaging? Here's how to hide your online status in WhatsApp.

By 
Young Guy on Computer  1
3 Ways IP Grabber Links Are Security and Privacy Risks

Learn what IP grabbers are, how they work, and the different ways they can be security and privacy risks while browsing online.

By 
vpn protected logo on tablet 1
VPN
6 VPN Protocols Compared: Which Is Best?

There are several VPN protocols to choose from, but which one comes out on top? Should you prefer one over the other? Let's find out.

By 
68 69 70 71 72
Page 70 / 75