MUO

Data Security

Page 11

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Google logo on a tablet 1
6 Google Privacy Settings You Should Consider Changing

Google collects a lot of data about you, it's the price you pay to access the company's free services. But you can still have some control over it.

By 
digital-decay 1
What Is Digital Decay & Data Degredation?

Your digital data isn't as secure as you think. Data degradation is a real thing, and it affects millions of us every year.

By 
Man Browsing on iPad 1
What Is a Privacy Program and How Can You Make One?

Users need to know they can trust a website or business with their important data. That's where a privacy program comes in handy.

By 
Mobile security - Cyber attack alert 1
Are Institutions Doing Enough to Protect Your Data?

Data breaches and exposures are on the increase in the United States. So how do companies try to keep your info private? And how can they improve?

By 
Guy with Lines of Code on Background 1
6 Ways to Make It Harder for Data Brokers to Collect Your Data

Data brokers stalk you 24/7 to collect your data and sell them to third parties. Here's what you can do to make it harder.

By 
Hands Shaking 1
4 Types of Data Brokers You Need to Know About

Your personal information is valuable. But who actually wants it? And who is seeking it out for them? Here's what you need to know about data brokers.

By 
home network connection smartphone app feature 1
How to Set Up a Secure Home Network

Learn how to set up your home network securely, keeping your devices and data safe at all times.

By 
Work Desk 1
What Is Sensitive Data Exposure and How Is It Different From a Data Breach?

Find the difference between the two and learn how to protect yourself in our increasingly online world.

By 
keyboard secure lock 1
How to Create a Self-Signed Certificate in Linux

Generating a self-signed certificate is rather easy on Linux. Here's how you can create one from the Linux terminal.

By 
mac-laptop-with-green-coded-screen-and-money-flying 1
How Does the NYDFS Cybersecurity Regulation Affect You?

The NYDFS cybersecurity regulation is now in effect, so what does this mean for you? How might this make online privacy even more secure?

By 
windows 11 vpn logo feature 1
VPN
How to Set Up a VPN in Windows 11

Here's how you set up and manually configure a VPN in Windows 11 for some extra privacy and security.

By 
A DNS server 1
DNS over HTTPS: Is Encrypted DNS Slower?

Protecting your internet connection requires a multi-layered approach, and DNS over HTTPS could be the next piece of the puzzle.

By 
encryption-terms 1
12 Basic Encryption Terms Everyone Should Know by Now

Everyone's talking about encryption, but finding yourself lost or confused? Here are some key encryption terms you need to know.

By 
Man holding cybercrime sign.  1
What Is Cybercrime? Online Crimes Explained

Cybercrime exploits technology to carry out illegal activities, but how does it work and what forms does it take?

By 
Shark-crossing-warning-sign 1
What Is Wireshark and How Can You Use It to Secure Your Network?

This free cross-platform packet sniffer can securely analyze data. Here's how you can use Wireshark to troubleshoot network issues.

By 
A poke ball is seen next to a smartphone  1
The ShinyHunters Hacker Group Collects Data Like Gamers Collect Pokémon

These cybercriminals have hit major companies. You might've even seen their logo: it's the Pokémon, Umbreon. Here's what you need to know.

By 
Image of man starring at a locked laptop computer.  1
The Top 5 Ransomware Removal and Decryption Tools

Hit by ransomware and don't want to pay the ransom? You do have options. Here are some of the top decrypting tools you should consider.

By 
who is watching you CCTV 1
What Is Surveillance Capitalism?

Here's how the digital environment we've surrounded ourselves in is driven by consumerism, and how this wealth of data can be used to track you.

By 
security alert screen 1
What Is Ransomware as a Service?

The threat of ransomware has never been greater, and that's partly down to Ransomware as a Service. So what is it and how can you protect yourself?

By 
Screenshot shows blurred MS Word files juxtaposed against the word  1
WastedLocker: A Complex Ransomware Variant That Targets Large Corporations

This strain of ransomware (and its Hades variant) has targeted countless high-profile companies, including Garmin. Here's what you need to know.

By 
9 10 11 12 13
Page 11 / 15