MUO

Online Security

Page 15

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
trio of syringes on pale blue background 1
SQL
What Is an SQL Injection? Is It Dangerous?

SQL injections are a form of cyberattack that have been around since the 1990s. So what are they and how do they work?

By 
BAD-HABIT-BROWSING 1
10 Mistakes You're Making While Browsing the Web

Most of us spend hours on the Internet every day. As it turns out, you may be sabotaging your own web browsing experience with a few simple mistakes.

By 
people looking at programming on pcs 1
How Do Load Balancers and Real IP Relationship Risk Your Security?

Load balancers play an important role in information security, but they can also lead to problems with IP spoofing and more.

By 
red filtered photo of cctv camera mounted on wall 1
What Is Commercial Spyware? Is It Used by Governments?

Spyware, i.e. software used to monitor and track your activities, is more prevalent than you might think. It even has its own commercial variation...

By 
maxthon logo in front of black and white net background  1
Is the Maxthon Web Browser Safe to Use?

The Maxthon browser has a number of great features, but it's suffered some privacy issues in the past. So is Maxthon actually secure and private?

By 
Encrypted email symbol seen on black background 1
4 Reasons to Use an Encrypted Email Service

Most of the world has an Outlook or Gmail address, but you should favor lesser-known services that use strong encryption instead. Here's why.

By 
smartwatch on table displaying lock screen 1
What Makes a Password Truly Secure?

Passwords can be easy to crack. So how can you make yours secure? Here's what makes up a safe password that hackers will find difficult to crack.

By 
person holding a credit card 1
Credit vs. Debit Cards: Which Is Safest for Online Shopping?

Making an online purchase? Will you be using a credit card or debit card? Do you know which is safer to use? Time to find out!

By 
Image of Sign-in Screen and Shield on Blue Dotted Background  1
Passwords Are a Thing of the Past: Why Passwords Are Phasing Out in 2023

It may be hard to imagine an internet without passwords, but many websites are already ditching passwords in favor of alternative ways to sign in.

By 
A cartoon vector of Elon Musk with a cage with the Twitter logo inside 1
Why You Should Be Worried That 200 Million Twitter Emails Have Leaked

Anyone can download the massive data file stolen from Twitter by hackers. It links usernames to email addresses—and that's a big deal.

By 
Netflix app on a smart TV 1
15 Ways to Protect Your Smart TV from Cyberattacks

A smart TV is a computer (and a pretty vulnerable one). Fortunately there are steps you can take to limit the risks of having a smart TV in your home.

By 
WebRTC logo seen on black background 1
What Are WebRTC Leaks and How Can You Prevent Them?

Your real IP address could leak thanks to WebRTC. Here's why that's bad for your privacy and what you can do about it.

By 
An illustration of Opera GX vs. Google Chrome 1
Opera GX vs. Chrome: Which Browser Is More Secure?

Both Google Chrome and Opera GX, the browser made for gamers, make strong claims about security. But which is most secure?

By 
Green shield seen on an image representing crowdsourcing  1
What Is Crowdsourced Security?

When new software hits the market, it's tested for vulnerabilities. One way is through crowdsourcing. But is that reliable? Is it actually safe?

By 
open padlock with key beside it 1
Passwords vs. Passkeys: What Are the Differences?

We all use passwords for online accounts, but could they soon become a thing of the past? If so, what are passkeys, their natural successor?

By 
Woman Typing on Her Laptop 1
How to Detect Keyloggers and Remove Them

Keyloggers are a type of spyware that can keep track of your keystrokes. They're also very hard to detect. Here's what you need to know.

By 
SCAM ALERT sign against cloud background 1
How to Spot a Scam on Etsy: 10 Tips

Etsy is a warm, friendly place to buy items from, but that doesn't mean scammers don't operate on the platform. Quite the opposite, in fact...

By 
Purple lock symbol and encryption symbol seen on dark background 1
Password Locking vs. Encryption: What's the Difference?

No, securing your data with a password isn't the same as encrypting it. So what do these terms mean? Which is safer?

By 
ICMP Flood Attack 1
How to Detect an ICMP Flood Attack and Protect Your Network

This denial-of-service attack can overwhelm your system, rendering it inoperable. Here's how to prevent this from happening.

By 
A hand holding a phone with its VPN turned on  1
The 8 Best Free Cybersecurity Tools to Keep You Safe as a Remote Worker

More of us are working from home. What can you do to maintain the same security you might have in the office?

By 
13 14 15 16 17
Page 15 / 75