MUO

Online Security

Page 14

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a person typing on a laptop while wearing a pair of fingerless gloves 1
Don’t Be a Pagejacker’s Victim: What Pagejacking Is and How to Stop It

Packjacking redirects a visitor and steals a website owner's source of revenue, causing panic for one and financial harm to the other.

By 
image of nebula behind malware graphic 1
What Is Bad Rabbit Ransomware?

Love Game of Thrones? So does the creator of this scary ransomware variant, which references the fantasy drama in its code.

By 
White Computer Screen Showing a Red Triangle with an Exclamtion Mark Inside 1
What Is a Remote Desktop Protocol Attack and How Can You Prevent It?

Many of us are relying on RDP as we work from home, and attackers are taking advantage of the opportunity. Here's how to stay safe.

By 
Person using a mouse 1
What Is Mousetrapping and How Do You Break Free?

An online mousetrap won't kill you, but being stuck is a frustrating feeling, and you may unwittingly download malware as you squirm.

By 
kids surrounding a laptop device 1
Is Your College or School Wi-Fi Safe and Do They Monitor It?

Can schools and colleges see what you search for via their public Wi-Fi? Is it safe to use your school's internet? Here's what you need to know.

By 
An email key on a keyboard 1
What Is Email Spoofing? How Scammers Forge Fake Emails

It looks like your email account has been hacked, but those weird messages you didn't send are actually due to email spoofing.

By 
ChatGPT logo seen on light green background 1
Will ChatGPT Become a Cybersecurity Threat? Here's What to Watch Out For

As fun as ChatGPT is, it could be a major security and privacy threat. Here are a few ways cybercriminals could use this AI chatbot.

By 
padlock on iphone bright background 1
Lost Your Phone? Here's How to Turn Off Two-Factor Authentication on Facebook Without a Phone

If you've set up this extra security step but lose your phone, here's how to disable two-factor authentication for Facebook.

By 
secure web icon 1
What Is Encrypted DNS? 4 Top Providers to Improve Online Privacy and Security

You may already encrypt all the things, but have you thought about shielding your DNS queries? Doing so offers some of the benefits of using a VPN.

By 
directories list ubuntu 1
What Is DLL Hijacking and How Can You Prevent It?

DLL files are an important part of Windows, but they can also leave you open to hacking. Here's what you need to know.

By 
VPN shield, laptop on background  1
VPN
12 Totally Free VPN Services to Protect Your Privacy

Free unlimited data VPNs don't exist unless they're scams. Here are the best actually free VPNs around that you can try safely.

By 
Digital illustration shows a laptop screen with a shield and needle on it. 1
What Is a Fault Injection Attack (FIA)? Should You Be Worried?

Manufacturers use fault injections to test their products. Cybercriminals can use this method too. Here's what you need to know.

By 
red flag blowing in wind 1
The Top 7 Malware Warning Signs to Look Out For

Worried your device is infected by malware? Or want to recognize the symptoms of an attack? Here are some red flags you need to know about.

By 
shops spending spree sunglasses 1
What Is Wish? Is Wish Legit, Safe, and Reliable for Shopping?

Wish is an increasingly popular online shopping service. But is it safe to buy (potentially inferior) goods from China?

By 
Software Engineer Standing Beside Server Racks 1
What Are Local File Intrusion (LFI) Attacks and Should You Be Worried?

If your site runs on PHP, you might be at risk of local file intrusion attacks. But how are they carried out and what can you do about them?

By 
creating passwords on ubuntu 1
10 Ways to Generate Secure Passwords on Linux

It's crucial you use strong passwords for your online accounts. And you can even get your computer to choose one for you.

By 
Padlock with asterisks on white background   1
What Are Rainbow Table Attacks?

How do cybercriminals access your accounts? They might use rainbow tables to find out your password. Here's what that means and what to do.

By 
Credit cards seen on a circuit board 1
Can You Trust Your Browser With Credit Card Information?

Shopping online and tempted to save your credit card information in your browser? Here's why you might not want to do that.

By 
programming codes on PC screen 1
What Is an OS Command Injection?

You might have heard of this dangerous attack vector, but what actually are command injections? How do they work and how can you protect yourself?

By 
malicious attacker in the cloud 1
What Is Cloud Malware? Types of Attacks and How to Defend Against Them

The cloud consists of countless servers, and malware can target those computers just like any other. How do we keep the machines in the cloud safe?

By 
12 13 14 15 16
Page 14 / 75