MUO

Data Security

Page 5

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Woman Operating Computer 1
What Is Cyber Resilience and Why Does It Matter?

It's good to stop a cyberattack from succeeding, but how well can you handle the attacks that get through your defenses?

By 
digital graphic of green matrix code 1
What Is Cryptovirology? Is It Dangerous?

Here's how a method of protecting and securing your data can actually be used against you by cybercriminals.

By 
a customer making payment with a pos 1
What Is Point-of-Sale (POS) Malware and How Can You Protect Your Business From It?

Learn everything about point-of-sale malware so that you can implement the proper steps to protect your customers' information.

By 
A woman using a VPN tool on her laptop 1
VPN
7 Disadvantages of Using a VPN

VPNs offer numerous benefits, are you aware of the potential drawbacks of using one?

By 
A padlock with the Twitter logo superimposed on it 1
How to Protect Yourself After the Latest Alleged Twitter Data Breach

Details of more than 400 million Twitter accounts are reportedly for sale, so what does this mean for your security?

By 
workplace environment desks 1
What Are the Security Risks Associated With Quiet Quitting?

Quiet quitting is harmful for productivity and success, but it can also be a threat to your company's security. Here's what you can do.

By 
key opening a padlocked gate snowing 1
If You've Ever Used LastPass, You Should Change All Your Passwords Now

The password manager, LastPass, has been breached by hackers, which means your master passwords could be for sale.

By 
Spying 1
7 Types of Passive Attacks That Can Easily Go Undetected

Like a spy lurking in the shadows, those conducting passive attacks don't want you to know they're keeping an eye on you.

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
4 Types of Active Attacks and How to Protect Against Them

Active attacks are direct efforts to circumvent someone's online defenses. When you know what to look for, you can better beef up your own security.

By 
Photo of Windows Logo 1
What Is Windows Credential Guard, and Should You Use It?

Enterprise and Pro versions of Windows 10 and Windows 11 offer Credential Guard, but what does that do, and how can you enable it?

By 
Credit cards seen on a circuit board 1
What Is Carding and How Can You Stay Safe From It?

Everyone is at risk from carding, a type of financial fraud which leaves you open to monetary losses and identity theft.

By 
Mobile Phone on a Laptop Keyboard 1
6 Major Challenges of Data Synchronization in Cybersecurity

Having data available simultaneously in multiple locations is great, but things can and do go wrong. Here's what to avoid to keep your files in sync.

By 
Typing on Laptop in the Dark 1
What Is BlackCat Ransomware and How Can You Prevent It?

BlackCat is actually the name of a type of ransomware and the hacking group responsible for it. Here's what you need to know.

By 
amazon logo on smartphone screen 1
Would You Let Amazon Monitor Your Phone Data for $2 a Month?

Is your privacy worth that much?

By 
phishing key on keyboard  1
The Biggest Security Threat of 2023? It's Phishing

There's an abundance of scams cybercriminals use to target your private data. So what's the biggest threat of 2023? The answer might shock you.

By 
Blue email symbol seen on a dark background with web 1
Has Your Email Address Leaked to the Dark Web? How to Check and What to Do

Do you think your data has been compromised? Here's how to check if your email has leaked to the dark web, and what to do about it.

By 
highlighting importance of privacy 1
6 Ways Your Privacy and Security Were Threatened in 2022

Our world isn't very conducive to anyone concerned about their privacy. Here are a few ways cybercriminals have been stealing your data in 2022.

By 
comparing codes on laptop and PC 1
How to Prevent File Upload Vulnerabilities

Any website that allows users to upload their own files can be attacked by hackers. Fortunately, there are things you can do to secure your site.

By 
Image of a Hacker in Hoodie with a city background 1
The 5 Biggest Data Breaches of 2022

Here are some of the most notable data hacks of the past 12 months, taking into account the number of people affected and the type of info leaked.

By 
Woman Working on a Laptop 1
What Is Data Synchronization and Why Is It Important?

Keeping all your data sets in sync is important to combat data losses and breaches. So how does data synchronization work?

By 
3 4 5 6 7
Page 5 / 15