MUO

Online Security

Page 11

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
windows defender security notification on laptop screen 1
Does Antivirus Detect and Remove All Malware?

You pay for a good antivirus suite, so it should be able to detect all viruses and threats, right? That's easier said than done...

By 
VPN shield, laptop on background  1
VPNBook Is Free, But Is It the Right VPN For You?

Most free VPNs are marred by limitations and drawbacks. Is VPNBook any different? Learn about its features and decide if it's the best fit for you.

By 
An anonymous cybercriminal, wearing a hoodie, working at a laptop. The scene is dark and the criminal facing us has a large question mark in front of their face. 1
Check Your Password Security With Python

Build your own password checker with this simple tutorial.

By 
what out for red flags of tech scams 1
How to Avoid the "Financial Hardship Department" Email Scam

The Financial Hardship Department scam goes after your money when you have little to spare. Here's how to keep your money secure.

By 
burp suite logo on a background with a man typing 1
How to Install and Set Up Burp Suite on Linux

Get started with web application testing on your Linux computer by installing Burp Suite.

By 
woman at desk looking at three screens 1
FTP
How Do Hackers Attack FTP Servers and What Can You Do About It?

Even the process you use to transfer files between devices can be attacked by hackers so data can be stolen. Here's what you need to know.

By 
Woman Working on a Laptop  1
What Is Process Injection, and How Can You Prevent It?

The most effective cyberattack is the one you can't detect. Process injection allows an infiltrator to hide in plain sight.

By 
blue and white email logo on home screen 1
Is Your Business Email Secure, and Who Is Able to Read Your Messages?

Which type of business conversations are more at risk—email or instant messaging? Bosses and hackers alike can get access to both.

By 
A person's finger pointed towards the observer, with cybersecurity icons around it 1
Why People Are the Weakest Link in the Cybersecurity Chain

The lack of cybersecurity awareness and poor security practices are the primary reason why cybercriminals see us as easy targets.

By 
Cyber security protection firewall interface concept 1
Can a Cybersecurity Awareness Course Keep You Safe Online?

If you're looking to train yourself and employees in solid cybersecurity measures, security awareness training is essential.

By 
Beautiful Woman With a MacBook 1
What Is Data Masking and What Are Its Benefits?

Data masking is like setting up a decoy. Attackers think they've gotten their hands on your data, but the joke's on them.

By 
Man and Woman Operating a Mobile Phone Smiling 1
What Is Identity Sprawl and How Can You Reduce It?

You've likely left traces of your identity all over the web. What can you do to keep your personal information from falling into the wrong hands?

By 
Laptop on a desk with the word reported seen on the screen 1
Came Across a Fishy Website? Here's How to Report It

Found a shady website that you suspect is a phishing scam? It's your duty to report it! Here's why and how.

By 
VPN global map 1
VPN
Should You Use Hotspot Shield's Free VPN?

Hotspot Shield Basic is a free VPN service, but how good is it? Does it keep you safe online? Can you watch Netflix via Hotspot Shield?

By 
Fingers on a Laptop's Keyboard  1
What Are Enumeration Attacks and How Can You Prevent Them?

Attackers often need access to your network before they can do damage. Enumeration attacks offer both blunt and sneaky ways to get in.

By 
An Image of Smarphone Shoiwng a Padlock 1
Bitwarden's Secure Notes: How to Safely Store Private Information

Bitwarden isn't limited to managing passwords. The service provides a safe way to store all kinds of sensitive information.

By 
Man Seated at a Work Desk 1
6 Ways to Simplify Your Cybersecurity Efforts

It's easy to fall in the trap of doing too many things, making mistakes, and getting overwhelmed. Here's how to implement defenses you can maintain.

By 
White Computer Screen Showing a Red Triangle with an Exclamtion Mark Inside 1
SMB Protocol: How It Works and What Makes It Vulnerable

Originally designed for small offices and household use, SMB is now widely used—and widely exploited.

By 
black and white metaverse graphic with red alert symbol 1
7 Metaverse Crimes to Watch Out for in Virtual Worlds

Cybercriminals can attempt the same kind of antics in the metaverse that they utilize in other corners of the web.

By 
A hand holding a credit card in front of a laptop 1
8 Types of Tools to Help Improve Your Online Security and Privacy

The more you do online, the more data you put at risk. With the right tools, you can keep this activity relatively private and secure.

By 
9 10 11 12 13
Page 11 / 75