MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 73

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
vpn deactivated on laptop screen 1
What Happens When You Turn Off Your VPN?

What happens if your VPN suddenly disconnects? Is your data exposed? And if so, how can you still protect yourself without a VPN?

By 
Young Man on Snapchat 1
6 Security Reasons to Change Your Snapchat Username

Snapchat now lets you change your username. But why might you want to? Here are security- and privacy-related reasons to consider.

By 
Antivirus software program illustration 1
Why Installing an Antivirus Suite Isn't Enough

Antivirus security software is essential, but won't protect you from all threats. Here's why an antivirus sometimes slips up and what else you need.

By 
Securing Loopholes 1
The Top 10 Vulnerability Scanning Tools

Want to improvise your company's vulnerability management policies? Here are some tools that can help you move forward.

By 
photo of a flying drone 1
Can Drones Be Hacked?

Drones aren't commonly thought of as potential targets for hackers. So, are they at any particular risk?

By 
Human brain with question marks in bubbles 1
How Do Cybercriminals Bypass Security Questions?

Hackers do find ways to answer your security questions to access your accounts. But how? Surely they're uniquely personal to you?

By 
USB flash drive, memory card, CD, and hard drive 1
How to Maintain an Effective Backup Schedule (and Why You Should)

Bored of regularly backing up your personal information? It's a crucial bit of maintenance, so here's how and why you need to back everything up.

By 
Snapchat download on phone 1
What Data Does Snapchat Collect From Its Users?

Snapchat collects data from users for several reasons. But what kinds of information does it have about you?

By 
silver MacBook resting on white desk near desktop computer and showing colorful coding 1
Are No-Code and Low-Code Development Platforms Secure?

No- or low-code environments are great for businesses with little tech expertise, but are they really safe for you to use?

By 
pentesting-1 1
The 8 Most Vulnerable Ports to Check When Pentesting

Pentesting is used by ethical hackers to stage fake cyberattacks. If you're attempting to pentest your network, here are the most vulnerably ports.

By 
Spring-cleaning a smartphone 1
8 Tips to Give Your Smartphone a Security Spring Clean

Clearing your garage and attic? Giving your house a spring clean? It's vital you take those same principles to your smartphone security.

By 
Gmail loading up on a silver mac laptop 1
Everything You Need to Know About Gmail’s Login Security Warning Alerts

Google's login security alerts in Gmail can be pretty annoying, but is it a good idea to try and disable them? Let's dive in and find out.

By 
windows defender-like antivirus 1
Your Microsoft Defender Is Getting a Small (but Powerful) Upgrade

It can now prevent vulnerable drivers from installing themselves on your system.

By 
apple iphone information 1
How Does Malware Make It Through to the App Store?

Most apps in the App Store and Google Play Store are safe, but you can still find fraudulent ones. So how do they make it through companies' checks?

By 
MacBook Pro backing up files on an external drive 1
Here's Why You Need to Store Back-Ups on External Devices

Regularly backing up your data can be a headache. But it's certainly worth your time. Here's why you need back up files and unplug the device too.

By 
Child Watching TV 1
Everything You Need to Know About Kaspersky Safe Kids

A flexible parental monitoring solution, Kaspersky Safe Kids provides reliable protection to keep kids safe online as well as offline.

By 
Windows Firewall Control Featured 1
How to Customize Your Windows Firewall With Windows Firewall Control

Want more control over Windows Firewall? Here's a handy tool that lets you get the most out of Microsoft's native solution.

By 
vpn activated on laptop screen 1
How a Double VPN Can Keep Your Activity More Private Online

Some services offer an added layer of encryption through double VPNs. But what actually happens if you use two VPNs? What does this mean?

By 
two people looking at laptop, one with a watch pointing and the other with a grey sweater typing 1
How Can You Prevent Formjacking?

Formjacking is a dangerous cyberattack that can result in financial loss and identity theft. So what is formjacking and how can you stay safe?

By 
iPad with Apple Pencil on table 1
How to Enable and Change the iPad Lock Screen

Keep your iPad secure by enabling the Lock Screen with this guide.

By 
71 72 73 74 75
Page 73 / 75