MUO

Data Security

Page 12

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
icloud private relay 1
Apple's iCloud Private Relay Leaks Users' IP Addresses: Should You Be Worried?

Is Apple's Private Relay even ready for public use?

By 
Woman with Numbers Projects on Her Face 1
How to Stop Data Brokers From Collecting Your Data

Data brokers want to sell your data to the highest bidder. Here's how to stop them.

By 
Messaging apps on phone 1
How and Why to Fully Encrypt Message Backups on WhatsApp

In a bid to close a security weak point, WhatsApp now lets you encrypt message backups before uploading them to the cloud. Here's how.

By 
Woman with Laptop 1
5 Ways to Identify Employee Data Theft

When a company holds a lot of sensitive info, it can feel overwhelming keeping track of who is accessing it. Here's how to monitor for data theft.

By 
delete-yourself-from-the-internet 1
Can You Delete Yourself From the Internet? Yes - Here's How

Your online presence is permanent, right? Is it even possible to delete yourself from the internet?

By 
xiaomi phone data 1
Xiaomi Smartphones: Can You Trust Them With Your Data?

Xiaomi has a questionable history when it comes to data collection. But things have changed. So can you really trust Xiaomi with your personal info?

By 
solarwinds logo feature background 1
What Was the Impact of the SolarWinds Hack?

Sometimes known as the Sunburst hack, the SolarWinds data breach was a turning point for cybersecurity. Here's what happened.

By 
No 1
How to Keep Advertisers From Stealing Your Data

Your data is worth more than you might think. Here's how services collect your personal information and what you can do to fight against it.

By 
Ransomware 1
The Top 6 Ransomware Protection Tools to Safeguard Your System

Keep ransomware away from your system with these protection and decryption tools.

By 
Data Storage 1
4 Ways to Decentralize Your Business Data 

It's not always a good idea to keep business data all in one place. Here's why you need to decentralize information, and how to do so.

By 
Lock On Top of Keyboard 1
How to Craft Incident Response Procedures After a Cybersecurity Breach

We'll show you how to give hackers the boot by building a set of solid incident response procedures.

By 
Macbook sitting on a desk in a dark room with its screen half closed. 1
Mac
5 Important Security Features Built Into Your Mac

Ever wondered what your Mac does to keep your data safe? Here are key security functions built into macOS that you should use to protect your system.

By 
protonmail swiss french flag feature 1
Why ProtonMail Thinks Everyone Should Start Using Tor

Using ProtonMail? Maybe you should be accessing your account through Tor or a VPN.

By 
telemetry feature ekg machine showing data 1
What Is Telemetry and What Information About You Is Gathered?

Telemetry is all about data collection, but what information is gathered, and how is it used?

By 
camera in red 1
How the Government Spies on You With Collected Data

Your social media accounts and smartphones collect data about you, and that information can be used by government agencies. Here's how and why.

By 
vpn map 1
Is a Decentralized VPN Safer Than a Regular VPN?

While regular VPNs claim to provide secure internet connections, decentralized VPNs might actually attest to this claim.

By 
T-Mobile logo 1
What’s the T-Mobile Breach and Will It Affect You?

Data from 50 million people was compromised, including those who had only applied for the service. Here's what you need to know.

By 
T-Mobiles logo 1
T-Mobile Investigates Hacker's Claims of a Huge Data Breach

100 million people's credentials are potentially at risk, but is the hacker telling the truth or is it one huge bluff?

By 
pinterest on black iphone 1
What Does Pinterest Know About You? Here's How to Find Out

Pinterest doesn't offer a straightforward process for downloading your data. Here's how to get your info from the platform.

By 
secure cloud 1
How Secure Is Your Data in the Cloud?

Just how safe is the data you've stored in the cloud? You may be surprised.

By 
10 11 12 13 14
Page 12 / 15