MUO

Computer Security

Page 20

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Windows 10 homescreen 1
How to Manually Disable Windows Defender in Windows 10 Home

Want to disable Windows Defender in Windows 10 Home without messing with the registry? Here's how to do that!

By 
usb-key-security 1
How to Use a USB Key to Deal With Security Threats

Aren't USB flash drives redundant? We don't think so. There are many ways in which a USB drive can still come in handy, including keeping your computer secure. Here's how.

By 
recycle-hardware-security 1
Beware These 8 Security Issues When Recycling Hardware

Recycling old hardware is a good idea, but you don't want to give away personal data. Consider these security concerns before getting rid of your hardware, and see what you can do about them.

By 
Windows XP logo with bandages in front of Bliss wallpaper 1
How to Tweak Windows XP and Stop Worrying About the Apocalypse

Are you forced to stay with Windows XP? Using an unsupported operating system is risky, but don't despair! We show you how you can carry on running Windows XP, if you must.

By 
bootkit-nemesis 1
What Is a Bootkit, and Is Nemesis a Genuine Threat?

Hackers continue to find ways to disrupt your system, such as the bootkit. Let's look at what a bootkit is, how the Nemesis variant works, and consider what you can do to stay clear.

By 
edge-pdf-exploit 1
Microsoft Edge's PDF Exploit: What You Need to Know

The new Microsoft Edge browser has introduced new problems, such as its PDF exploit. But what is it? Are you safe? And is Edge unique with these types of issues? Let's investigate.

By 
windows-defender 1
Windows Defender Can Now Scan for Malware on Startup

Windows Defender may not be the best security solution, but Microsoft is working hard to make it relevant. Here's an update you might find worthwhile.

By 
computer-vulnerability 1
How to Tell if Your Computer is Vulnerable to Hackers

Do you really know how vulnerable your computer is? It can be difficult to tell, so here are three different things you can check to see just how safe you are from hackers and scammers.

By 
zero-day-exploit 1
5 Ways to Protect Yourself from a Zero-Day Exploit

Zero-day exploits, software vulnerabilities that are are exploited by hackers before a patch becomes available, pose a genuine threat to your data and privacy. Here is how you can keep hackers at bay.

By 
linux-security 1
Is Linux Really as Secure as You Think It Is?

Linux is often touted as the most secure operating system you can get your hands onto, but is this really the case? Let's take a look at different aspects of Linux computer security.

By 
 1
Mac
Mac Users Beware: A Bug in Sparkle Could Get You Hacked

A bug in the Sparkle updater framework could result in your Mac being taken over by a hacker. Here's what you need to know.

By 
dead-apps-drown-ms-store 1
How Dead Apps Are Drowning the Windows Store

Dead apps are everywhere in the Windows Store. Why are apps abandoned, how does it affect users, and how could Microsoft solve this dilemma? We analyze the sad state of the Windows Store.

By 
cwa-history-malware 1
5 Sites to Learn the History of Malware

Experience malware from the pre-Internet age. These websites will let you dig through the history of the humble computer virus.

By 
buying-security-suite 1
4 Things to Consider When Buying a Security Suite

McAfee, Kaspersky, Avast, Norton, Panda - all big names in online security. But how do you decide which to choose? Here are some questions you need to ask yourself when purchasing anti-virus software.

By 
linux-vulnerability 1
traveler-security 1
6 Online Security Tips for Travelers and Road Warriors

Whether you're traveling for business or pleasure, Wi-Fi networks, different online privacy laws, and physical dangers to your hardware all combine to make travel a risky business for your personal and data security.

By 
mac-security 1
Mac
Here's The Only Mac Security Software You Need

For most people, OS X is fairly secure out of the box — and there are a number of programs out there that potentially do more harm than good.

By 
upgrade-windows-8 1
Why to Upgrade Windows at the End of Extended Support

Eventually, support for every Windows version expires, leaving PCs full of holes, entry points for malware, and opportunities for hackers. Windows 8 recently reached end of support status - we show you why and how to upgrade.

By 
windows-support-scam 1
Readers' Windows Tech Support Scam Stories

The Windows Tech Support scam prevails. Little can be done to counter it, except to hang up. We have collected stories from our readers who engaged the scammers and their tales are obnoxious.

By 
security-tools 1
10 Great Security Tools You Should Be Using

You can never be too careful out there in the wild west that we like to call the Internet, so using free and low cost security tools is a good idea. The following are recommended.

By 
18 19 20 21 22
Page 20 / 22