MUO

Computer Security

Page 9

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
cyber hacker security 1
What Is an Advanced Persistent Threat and How Can an APT Be Detected?

What is an APT? These cyberattacks can have long-term ramifications, so here's how to spot an ATP and how to stop it.

By 
macOS Big Sur displayed on a MacBook 1
Update to macOS Big Sur 11.4 to Stop Attackers From Taking Secret Mac Screenshots

Updating will prevent malware from taking surreptitious screenshots or secret screen recordings.

By 
Windows 10 Best Security practices 1
9 Vital Steps to Secure Your Windows 10 Computer

Lock down a Windows PC with these security measures and ensure your peace of mind.

By 
maid 1
What Is an Evil Maid Attack and How Can You Prevent Falling Victim?

Going on vacation or regularly leave your device unattended? Here's why you need to be cautious about hardware security.

By 
A still from the Apple October 2020 event video showing Craig Federighi, Senior Vice President of Software Engineering, opening the lid of an M1 MacBook Air notebook 1
Apple Exec Admits macOS Malware Has Now Hit Unacceptable Levels

Blasting macOS security is one way to tout the benefits of the iOS platform.

By 
 1
How to Activate the Security Features on Microsoft 365

Looking to make Microsoft 365 more secure? Here are some setting you can adjust to make it safer for all users.

By 
Hand typing on a keyboard 1
How to Reconfigure Windows Defender to Better Secure Your Computer

Are you using Windows' built-in security suite to its full extent? Here's how you can configure Windows Defender and why.

By 
Customize Safari Start Page on Mac 1
Apple Launches Safari 14.1 With a Security Fix for Older Macs

Apple's also fixed these WebKit security breaches for users running iOS 14 and macOS Big Sur.

By 
A lost AirTag being found between the sofa cushions 1
Apple AirTag Review: Apple Finds Itself Ahead of the Rest

With competitive pricing but competitor beating features, Apple's long-awaited approach to Bluetooth tracking is not one to ignore

By 
hosts-file-linux 1
How to Modify and Manage the Hosts File on Linux

Want to block certain websites and limit internet access on Linux? Here's what you need to know about the hosts file.

By 
yubico 2fa key feature 1
Yubico Study Highlights Need for Stronger Multi-Factor Authentication in the WFH Era

We're moving away from passwords, but MFA still needs some work.

By 
install-git-mac 1
Install macOS Big Sur 11.3 ASAP to Protect Your Mac Against the Shlayer Malware

macOS 11.3 patches a major bug that let the Shlayer malware bypass Apple’s protections like GateKeeper and File Quarantine.

By 
Logic Bomb 1
What Is Logic Bomb Malware and How Can You Prevent It?

A logic bomb attack can delete data or send it to a malicious hacker. Fortunately, you can take steps to prevent logic bombs.

By 
Alert icon on a computer 1
What Is PUP Malware and How Do You Remove It?

Potentially unwanted programs can prove more than a mild annoyance. Here's how to remove PUPs.

By 
 1
4 Ways to Scan for Viruses Without Buying Antivirus Software

Use these security methods to scan your computer for malicious programs without using any third-party antivirus software.

By 
brute-force-attack 1
What Are Brute-Force Attacks? How to Protect Yourself

What is a brute-force attack? Here's how this common attack works and how to keep yourself safe from it.

By 
wipe-hdd 1
How to Completely Wipe a Hard Drive on Windows

There are two ways to wipe a hard drive. Here's what you need to know to get it done quick and easy.

By 
Closed Macbook Air 1
Avira Launches an All-In-One Security Solution for Mac

One of the biggest names in antivirus software has unveiled its latest offering for Macs.

By 
chrome-parental-controls 1
The 6 Best Chromebook Parental Control Apps to Monitor Your Child's Activity

Want to keep tabs on your family's internet use on Chrome OS? These Chromebook parental control apps are just what you need.

By 
Cyber Security Programming 1
The 9 Best Intrusion Detection and Prevention Systems to Boost Your Cyber Security

Need know when your business is under cyberattack? You need an intrusion detection and prevention system.

By 
7 8 9 10 11
Page 9 / 22