MUO

Computer Security

Page 10

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
shortcut-virus-remove 1
What Is a Shortcut Virus and How Do You Remove It?

A shortcut virus hides your files and folders, then replaces them all with shortcuts that look the same. Here's how to remove a shortcut virus.

By 
turn-off-windows-defender 1
5 Reasons You Should Turn Off Microsoft Defender on Windows

Wondering whether you should turn off Microsoft Defender on Windows? Here's why you should and how to stay safe afterwards.

By 
microsoft yubico yubikey feature 1
Yubico Donates Heaps of YubiKeys to Microsoft AccountGuard Customers

The YubiKeys will help protect against election interference.

By 
Security logo 1
What Is a Trusted Platform Module (TPM)?

Your computer has an extra security feature, but how does it work?

By 
Zombie App Privacy Security Featured 1
Why You Need to Delete Zombie Apps You No Longer Use

"Zombie apps" live on your device despite you never using them. Here's how they open you up to privacy and security problems.

By 
hacked script with a lock 1
What Is the Shellshock Bug and Is It Still a Risk?

The security bug called Shellshock, or Bashdoor, caused havoc in 2014. What is it all about and are we still at risk?

By 
best-antivirus-security 1
Does Antivirus Software Slow Down Your Computer?

Suffering performance lags on your device? Don't immediately blame your security suite...

By 
microphone-privacy 1
Why Your Computer Microphone Is a Real Privacy Concern

What if your privacy was being invaded without your knowledge? Here's how your computer microphone could be hacked.

By 
username and password required. 1
What Is the Principle of Least Privilege and How Can It Prevent Cyberattacks?

How much access is too much? Learn about the principle of least privilege and how it can help avoid unforeseen cyberattacks.

By 
Ransomware 1
What Is Ransomware and How Can You Remove It?

You've heard the stories, but what is ransomware? How does it work? Does it really steal your data - and how can you stop it?

By 
Mac mini 1
M1 Macs Get Their First Apple Silicon Malware

A variant of the insidious "Pirrit" adware, it goes undetected by the current anti-virus systems.

By 
microsoft bitlocker feature 1
Windows 10 Secure Boot Bug Triggers BitLocker Key Recovery Issue

Microsoft is working towards patching the issue affecting many Windows versions.

By 
share-passwords 1
How to Safely Share Passwords With Friends and Family

You should never share your passwords. But if you must, here's how to share your passwords while keeping your accounts as secure as possible.

By 
Man operating a Windows 10 computer 1
How to Stop Windows 10 From Blocking Your Downloaded Files

If you can't open files you’ve downloaded or received via email, it’s likely that Windows 10 is blocking them. Here’s how you can fix this issue.

By 
 1
4 Ways to Safely Run Suspicious Programs and Applications in Windows

Do you want to test new suspicious programs without the risk of harming your Windows 10 PC? We’ll take you through the best methods to do this.

By 
Rows of computers in a room 1
5 Ways an Offline PC Can Be Hacked

Some people believe taking a computer offline makes it impossible to hack. These offline PC attacks show it's not as safe as you imagine.

By 
Windows Firewall Allow Featured 1
How to Allow Apps Through Windows Firewall

Here's how to allow a new app through Windows Firewall, plus manage the apps currently allowed or blocked.

By 
dice 1
Make a Secure Password: How Dice can Reinvent Internet Safety

Here's why you really need to make strong passwords, and how the Diceware technique can secure your accounts.

By 
finger pointing to windows defender sign 1
How to Turn Off Windows Defender

Need to turn off Windows Defender protection in Windows 10? Here's how to disable it temporarily or permanently.

By 
A no Wi-Fi icon beside the sky 1
Is an Air Gapped Computer Really Secure from Online Threats?

An air-gapped computer network should stop online cyberattacks. But do hackers still pose a credible threat?

By 
8 9 10 11 12
Page 10 / 22