MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 8

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a microSD card used to secure the computer 1
How to Make Your Devices Safer Using Glitter Nail Polish

It might sound strange, but do you know you can use glitter nail polish to increase your device’s security?

By 
grayscale image of vpn active on smartphone 1
6 Signs of a Scam VPN

VPNs are rightly popular, and that means scammers have set up malicious apps posing as genuine VPNs too. Here's what to look out for.

By 
A person using an iPhone to take a photo 1
Transform Your Old iPhone Into a Security Camera With These 6 Apps

Instead of giving away your old iPhone or putting it away in the drawer, install one of these security camera apps to monitor your home with it.

By 
Woman with headphones listening to voice notes on WhatsApp 1
Is WhatsApp Accessing Your Mic at Night? No, It's Just a Bug

WhatsApp has responded to concerns that the app appears to be accessing some user microphones in the background.

By 
People silhouettes divided into groups 1
Centralized vs. Decentralized Identity Management Models: Which Is Better for Security?

Identity management models determine where data is stored and shared, so which is better: a centralized or decentralized model type?

By 
Laptop screen with 18+ sign 1
What Is Pornware? Here's Everything You Need to Know

You don't have to visit adult NSFW websites to be targeted by pornware. In fact, it can affect everyone. So what can you do about pornware?

By 
close up shot of phone with apps menu open on screen 1
5 Ways to Stay Safe When Downloading Smartphone Apps

Yes, smartphones can be infected by malware. One way this happens is through malicious apps, so how can you avoid installing one?

By 
red lock in front of numerical code on laptop 1
How Does Your Mac Protect Your Privacy?

The last thing you need to worry about as a Mac user is your privacy because Apple takes care of that for you.

By 
A person using a laptop with special effects in the foreground 1
6 Reasons Why Supply Chain Attacks Are on the Rise

Such attacks are becoming a major headache for cybersecurity teams, and countering them is a massive challenge.

By 
Google logo with sound waves, ears, and hands coming out of a smartphone 1
Your Phone Is Secretly Recording You: How to Stop Google From Listening

Is Google always listening on your phone? Here are the facts and how to stop Google from listening to you.

By 
man-typing-system 1
What Is Extended Detection and Response (XDR) and Why Do You Need It?

With this framework, you can gain the foresight to identify vulnerabilities that you might otherwise overlook.

By 
IPFS logos and scam letter on plain background 1
What Are IPFS Phishing Attacks and How Do You Avoid Them?

IPFS phishing attacks can bring you in trouble. Here’s how you can avoid them.

By 
Women working on a laptop with the American Emergency Fund website open. 1
American Emergency Fund Loan: Separating Fact from Fiction

The American Emergency Fund isn't technically a scam, but it might as well be.

By 
Person using chatGPT on his laptop 1
Can Cybercriminals Use ChatGPT to Hack Your Bank or PC?

ChatGPT can help people do a great number of things, including get access to your most sensitive information.

By 
A Finger Resting on a Smart Phone and Three Tablets in the Background 1
6 Reasons Web 3.0 Won’t Solve Your Privacy Problems

If you think Web3 would solve all your privacy problems, you might be wrong.

By 
An image of a person using a smartphone with the Gmail logo overlay in the middle 1
How Gmail's Blue Checkmarks Could Protect You From Phishing Emails

Everyone knows phishing is a major security risk. Google's blue checkmark initiative aims to tackle this problem, but it's not fool-proof.

By 
security sign on mobile 1
Zero Trust vs. Zero-Knowledge: What’s the Difference?

These two security concepts may sound similar but they’re completely different.

By 
Man working on a laptop 1
5 Threat Hunting Misconceptions You Need to Ditch Immediately

Make sure you do not fall prey to these misconceptions while threat hunting.

By 
Person Holding a Silver Keychain with a Key 1
How Passkeys Can Help Keep Your Google Account Safe

Passkeys are a secure alternative that's bringing us one step closer to a passwordless future. Here’s everything you need to know about passkeys.

By 
Woman surprised on computer 1
What Is Application Security and Why Do You Need It?

Application security can secure your data and protect it from external threats like hackers.

By 
6 7 8 9 10
Page 8 / 75