MUO

Online Security

Page 13

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Woman Working on Laptop at Home 1
What Is a Cybersecurity Maturity Model and How Does It Work?

You don't have to be an expert in cybersecurity to secure your systems. You can use an already-established maturity model to protect yourself.

By 
surfshark and nord vpn logos on laptop being used by person  1
VPN
Which VPN Is Best? Surfshark vs. NordVPN Plans and Features Compared

Looking for the best VPN for you? NordVPN and Surfshark are both great options. We compare features, pricing plans, streaming, and more.

By 
2 Men Working on Computers 1
Threat Hunting Practices and Tools to Secure Your Network

Don't wait for the hackers to come to you. Seek out your vulnerabilities and proactively prevent the next attack.

By 
A person wiping a PC with a cloth  1
7 Tips to Give Your PC a Security Spring Clean

Giving your house a spring-clean? It's also the perfect time to keep your PC secure and performing optimally, so here's what you need to do.

By 
malware warning on laptop screen 1
What Kind of Malware Is the Most Dangerous?

There are so many malicious programs now, you might be curious about which is actually the most dangerous. Here's what you should know.

By 
A Pair of Glasses in Front of a Computer Screen 1
8 Pros and Cons of Penetration Testing

Pen testing can be a costly business: we weigh up the advantages and disadvantages of it so you can come to a decision that's right for you.

By 
SCAM ALERT sign against cloud background 1
What Is the "Look Who Just Died" Scam? Here's the Right Way to Handle It

Have you received a message saying something like "Look who just died? I know you know him. So, sorry!?" It's probably a scam...

By 
Black Woman Using a Laptop 1
10 Essential Skills You Need to Work in Cybersecurity

Want to work in cybersecurity? It's not just technical know-how you need; here are some soft skills and tech knowledge that are key for IT experts.

By 
 1
How Does Encryption Work? Is Encryption Actually Safe?

You've heard about encryption, but what is it exactly? If criminals use it, is encryption safe to use? Here's how encryption works and what it does.

By 
Image of Two Mobile Phones Represenaitng a Fraud  1
How Zelle Scams Work and How to Protect Against Them

Zelle is a handy payment platform, but that means its users are big targets for scammers. Here's what to watch out for.

By 
a security logo displayed on a screen 1
How to Install Nessus on Kali Linux

Nessus is a great vulnerability scanner with free and paid-for options. Here's how to download and start using Nessus on Linux.

By 
How to Install and Setup BitWarden Add-On on Home Assistant 1
What Is Bitwarden Send and Should You Use It to Secure Your Private Data?

Plenty of us send sensitive data via insecure methods like email. That's a risky strategy. Fortunately, Bitwarden Send can help secure information.

By 
Reddit logo seen on grey background  1
4 Reddit Scams to Watch Out For

Are you an avid Redditor? Or looking to join Reddit? Here are some common scams you need to be aware of.

By 
swapping decryption key for money 1
Where Do Most Ransomware Attacks Happen in the USA?

Ransomware is scary, but are you likely to be affected? Here's where hackers attack the most and what you can do to protect yourself.

By 
Word and pdf document seen on black background 1
Can You Trust Online File Converters? Are They Safe to Use?

Want to change one type of file into another? Or remove a watermark? You might use a free online converter. But are they safe? Which should you try?

By 
laptop 1
What Is Extended Detection and Response and Why Is It Important?

Even those who aren't tech-savvy need to keep their networks secure. But how? That's where Extended Detection and Response (XDR) comes in.

By 
a software developer working on a computer system. 1
5 Dangerous Web Application Vulnerabilities and How to Find Them

If you're creating a web application, you need to make sure it's secure from cyberattacks. So what flaws should you know about?

By 
Close up of Xbox Controller joysticks 1
Can You Turn Off Strict NAT Type College Wi-Fi?

Want to play and host matches with fellow Xbox gamers? It will largely depend on your NAT type...

By 
Woman browsing in a bookstore  1
What Is Personally Identifiable Information (PII)?

Sometimes called "personal data", PII is valuable to you, to companies, and to hackers. But what is it? What does it include?

By 
Images of different browsers  1
What Makes a Web Browser Secure? Look for These Features

Most browsers claim to care about your security, but that doesn't mean they do (especially out of the box). Here are some features to find and enable.

By 
11 12 13 14 15
Page 13 / 75