MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 72

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
locate-lock-windows-11-device 1
How to Find and Remote Lock a Missing Windows 11 Device

Here's how to find and secure a Windows 11 laptop when it goes missing.

By 
anonymous cybercriminals email 1
Your Workplace Is at Risk: How to Prevent Business Email Compromise Attacks

Almost every business uses emails, and that means they're a big target for cyberattacks, including BEC. So what is BEC and how can you mitigate it?

By 
Cybersecurity logo 1
iPhone vs. Android: Which Is More Secure?

Looking for an iPhone or Android device? Here's our assessment of the security of each OS, including source-code, app stores, and update frequencies.

By 
bluetooth-encryption 1
What Is Bluetooth Encryption and How Does It Work?

Bluetooth has come a long way with encryption protocols to ensure your security. Here's how Bluetooth encryption keeps your data safe.

By 
Super Retina XDR Display on iPhone 1
Here’s How to View, Edit, and Delete a Saved Password on Your iPhone

Learn to keep track of all your passwords using the handy password manager built into your iPhone’s settings.

By 
salt-in-shaker 1
What Is Salting in Password Security and How Does It Work?

You might've heard of the term "salting" when it comes to securing passwords, but what is it and how does salting actually work?

By 
vpn behind no access logo 1
8 Places Where VPNs Are Illegal or Restricted

If you're travelling abroad, you might not be allowed to use a VPN. Here are some places using such encryption is banned or restricted.

By 
WordPress vulnerabilities 1
WordPress Plugins and Themes Could Have Vulnerabilities: How to Secure Your Site

WordPress itself might be safe, but the plugins used to maximize your blog's potential might lead to cyberattacks. Here's what you need to know.

By 
Cartoon fire next to a brick wall 1
Why You Should Use the TinyWall Firewall

Want to take control of your firewall? With TinyWall you can configure the Windows firewall just the way you want.

By 
VPN Privecstasy Unsplash 1
The 5 Best VPN Add-Ons for Opera

If you're looking for a VPN to keep you safe while browsing the web on the Opera browser, here are five of the best add-ons you can install.

By 
Man drinking coffee with Mac 1
Mac
How to Password Protect Pages, Keynote or Numbers Documents on Your Mac

Keep other people away from your iWork documents by adding a password to Pages, Keynote, and Numbers files on your Mac.

By 
cybersecurity lock 1
Microsoft Is Adding the Strongest Windows 11 Security Tool Yet... but There's a Catch

Windows 11's new Smart App Control will require a PC reset before you can install it.

By 
parcel delivery unattended 1
How to Prevent Package Theft and What to Do When It Happens

Getting something delivered from online? Package theft is a real concern, so what can you do to prevent it, and what if you're a victim of it?

By 
Bark app logo on phone screen 1
What Is Bark? The Social Monitoring App Explained

Children shouldn't be left unsupervised online, but how can you monitor them effectively? Find out how with Bark.

By 
Woman typing on laptop 1
Should You Use Hushmail for Encrypted Email?

If you're looking for an encrypted email solution, Hushmail is a good choice - but is it suitable for non-business use?

By 
suspicious man hiding behind white mask 1
What Is a Ransomware Gang and How Dangerous Are They?

Ransomware attacks on large-scale organizations require group effort and months of planning. Here, you'll learn everything about ransomware gangs.

By 
G Suite on Phone 1
5 Reasons Why Google Drive Is a Security Risk

Google Drive is a great cloud storage solution, but can you trust it with your private data?

By 
A hacker wearing a hoodie surrounded by visible data. 1
Why Are Hackers Targeting Phone Companies?

Cybercriminals aren't solely focused on stealing your smartphone information; they're targeting carriers themselves. Why? And what can you do?

By 
vpn active on tablet screen 1
Single vs. Double vs. Multi-Hop VPNs: Which Is Better?

Most people only use a single VPN, but is that enough to protect your security and privacy? Or are double or multi-hop VPNs better?

By 
duckduckgo-app-tracking-protection 1
How to Stop Android Apps From Spying on You With DuckDuckGo's App Tracking Protection

App Tracking Protection in DuckDuckGo can stop all your Android apps from spying on your activity and collecting data you don't want them to have.

By 
70 71 72 73 74
Page 72 / 75