MUO

Smartphone Security

Page 7

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
smartphone on desk with shield symbol on screen 1
What Are the Most Secure Blockchain Smartphones?

Blockchain smartphones fall under a niche product category, but if you're in it for securely storing crypto, here are the best ones to buy.

By 
iPhone with protected shield logo on screen 1
What Is Lockdown Mode on iOS 16 and When Should You Use It?

Apple introduced Lockdown Mode to protect iPhone and iPad users against targeted cyber attacks. But what does it do and do you need to use it?

By 
scanning a square code parcel iphone 1
4 Ways Scanning QR Codes Can Expose You to Security Threats

We're all used to quickly getting information by scanning a QR code. But they're also security and privacy risks. Here's why.

By 
Android robot with a smartphone 1
5 Best Ways to Permanently Delete Android Data

It's sometimes possible to recover files after you've deleted them. Here's how you can permanently erase your unwanted data.

By 
Apple Passkeys homepage for developers 1
How Do Apple Passkeys Work? How Do They Keep You Secure?

Are you ready to say goodbye to traditional username and password combinations? Apple might just have the answer.

By 
Sample of Android launchers  1
Are Third-Party Android Launchers Safe to Use?

Installing a launcher is one of the easiest ways to customize an Android phone. But are they safe? Here's what you need to know about launchers.

By 
skull and bones logo on phone screen 1
What Is Madware and How Can Your Protect Against It?

Malware, including adware, doesn't just target your PC and laptop. Madware in particular is aimed at your other devices. Here's how to avoid it.

By 
person-holds-white-bluetooth-earbuds-in-hands 1
Bluejacking vs. Bluebugging vs. Bluesnarfing: What's the Difference?

Your devices are open to Bluetooth attacks, but what do the three main Bluetooth attack types actually mean? How can you stay safe?

By 
Near Field Communication smartphones 1
How Does a Drive-By NFC Hack Work?

What is NFC, why is it on your phone, and does it present a security risk? Here's everything you need to know.

By 
Samsung Knox featured image 1
What Is Samsung Knox? How Does It Protect Your Privacy?

Samsung Galaxy phones feature the Samsung Knox security system. But what is it, can you trust it, and can it be hacked?

By 
Samsung Note 20 Ultra on textured background 1
How to Stop Your Android Phone From Tracking You

Your Android phone is tracking you in many ways. Here are eight steps you can take to stop it.

By 
iphone on table 1
Your iPhone Can Be Tracked Even When It’s Powered Off

Did you know you can track your iPhone even when it’s powered off? That sounds like a good thing, but it isn’t always.

By 
Black Girl Texting in Bed 1
10 Effective Ways to Prevent Falling Victim to Smishing Scams

Smishing is extremely common these days, and staying safe from such attacks is imperative. Learn what you can do.

By 
rup-conect-4 1
Connect 4 in Microsoft Teams, Protect Your Phone From Thieves, and Tablet Touchscreen Repair Tips

Learn about playing games in Microsoft Teams, how to protect your phone from thieves, and fix tablet touchscreen issues.

By 
disable enable defender firewall smartscreen 1
Microsoft Defender Has Arrived on All Your Devices... but It'll Cost You

You'll need to subscribe to Microsoft 365 before you can enjoy Defender outside of a Windows system.

By 
galaxy a52 1
How to Factory Reset Your Samsung Galaxy Phone

Need to restore your Samsung phone back to its factory settings? Here's how to hard reset a Galaxy device.

By 
Thief in the night 1
7 Tips to Protect Your Smartphone From Theft

Smartphones are expensive, which is why they're so interesting to thieves. Protect your phone from theft with these tips.

By 
Android Phone with Google Play Store Open on Screen 1
Why You Shouldn't Install Old or Abandoned Android Apps

There are more than a million abandoned apps on the Play Store right now. Here's why you shouldn't install them.

By 
man using phone at desk 1
SMS
What Is a Smishing Scam? How Can You Spot One?

The threat of smishing on smartphones is underestimated, but you need to beware these scams that can cost you your privacy and serious cash.

By 
swap a sim laptop apple macs 1
What Is SIM Card Swapping? 5 Tips to Protect Yourself From This Scam

With the rise in mobile account access and 2FA for security, SIM card swapping is a growing security risk. Here's how to stop it.

By 
5 6 7 8 9
Page 7 / 25