MUO

Smartphone Security

Page 6

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
man in the black clothes with smartphone typing on a laptop in dark room 1
What Is the Man-in-the-Disk Attack?

This scary Android cyberattack uses your external storage to take control over your whole device. Here's what you need to know.

By 
Duo Mobile app logo seen on black background 1
What Is Duo Mobile and Is It Safe to Use?

Duo Mobile is an authenticator app that helps you log into accounts safely. But is it actually secure to use?

By 
harley quinn cosplay with a baseball bat 1
What Is Harly Malware on the Google Play Store?

This Trojan malware silently signs you up to expensive subscription services to empty your bank account. Here's what you need to know.

By 
swap a sim laptop apple macs 1
What Is SIM Jacking and What Can You Do to Protect Yourself?

This scary scam can lead to identity theft, and you might not even know it's happening to you. Here's what you need to know.

By 
smartphone authenticator app for unlocking laptop 1
The 6 Best Authenticator Apps for 2FA and Other Enhanced Account Security

Looking for the best multi-factor authentication (MFA) apps? Whether you've got an iPhone, Android device, or another system, we've got you covered.

By 
Person holding a Google Pixel phone 1
The Top 12 Android Secret Security Codes You Need to Know

Looking for the best Android secret codes and hacks? Here are the top USSD codes to sharpen your smartphone's security and privacy.

By 
Man Holding Smartphone Wearing Black Notched-lapel Suit Jacket 1
What Does It Mean When You Hear “Is This Line Secure”?

How do secure phone lines work? What do they prevent? And can you get one yourself, or are they merely "Hollywood talk"? Here's what you need to know.

By 
coding programming encryption 1
Is Bluetooth Secure? Understanding Bluetooth Security and Attack Methods

Can Bluetooth be hacked? Here's what you need to know about how cybercriminals can target you using Bluetooth.

By 
hacking into bluetooth laptop smartphone coding 1
11 Bluetooth Attacks You Need to Know About

No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices.

By 
QR Stickers on a Metal Pole 1
What Is QRishing and How Can You Avoid It?

Do you scan every QR code you see? This clever phishing scam might make you think twice...

By 
Smartphone juxtaposed against a blurred image of fast food 1
DoorDash vs. UberEats vs. GrubHub: Are These Food Delivery Apps Safe?

Food delivery services might offer great meals, but they might not be all they're cracked up to be—especially when it comes to how secure they are.

By 
CamScanner logo seen on light green background 1
Is CamScanner Safe to Use? Here's What You Need to Know

CamScanner is a popular document scanning app, but does it collect data about you? Is it secure? And should you use it for your private information?

By 
Wickr app logo is seen on an image showing a man holding a smartphone 1
Is Wickr Secure? How the Encrypted Instant Messenger App Works

Wickr promises end-to-end encryption on your instant messages and much more, so is it secure to use? How does it compare to other instant messengers?

By 
Man Texting on Mobile Phone 1
What Is Mobile Application Management and Why Is It Important?

How do you secure your company data when employees use various devices and apps? That's where Mobile Application Management comes in handy...

By 
XMPP OMEMO smartphones chats logos 1
What Is OMEMO End-to-End Encryption? Chat Privately Using XMPP

XMPP is a long-running instant messaging protocol, but it's not a particularly private platform. So how can you encrypt messages when using XMPP?

By 
finding malware on your smartphone 1
These 35 Apps May Have Infected Millions of Android Devices. Check Your Phone Now

If you've got any of these apps installed on your phone, you should delete them right away.

By 
Signal and Wire logos seen on black background 1
Signal vs. Wire: Which Secure Messaging App Is Better?

Looking to encrypt your messages and safeguard your privacy and security? Wire and Signal are two great options; but which is best for you?

By 
iPhone lying on the floor at someone's feet. 1
Found a Lost or Stolen iPhone? Here's What to Do

Found a lost or stolen iPhone? Here's how you can try to unlock a lost iPhone and return it to its rightful owner.

By 
retired-seniors 1
How to Ensure Digital Safety and Avoid Online Scams as a Retiree

Scammers target the elderly as they're more vulnerable, but with these security tips, you wouldn't fall victim to their tricks.

By 
a hand holding a Samsung phone with the Google Play store on it 1
What Is Google Play Data and Where Is It Stored?

Google Play collects data about you, but where? Is it really secure? And how does Google Play Services also store your private information?

By 
4 5 6 7 8
Page 6 / 25