MUO

Online Security

Page 16

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Computers passing encrypted traffic 1
Kaspersky vs. Bitdefender: Which Internet Security Suite Will Keep You Safe Online?

Bitdefender and Kaspersky are two of the best antiviruses available. But which is best? We compare prices, features, and more to find out.

By 
graphic of horse in front of green matrix background 1
The 8 Most Common Types of Trojans You Should Know About

Trojans hide in seemingly harmless software, then spring their trap. Your best defense is knowledge, so here are the common Trojans to look out for.

By 
VPN logos 1
VPN
The 5 Best VPNs to Unblock Social Media Platforms

Looking for a social media VPN but don't know where to start? Here are the best VPNs for social media that we recommended.

By 
pointer focused on security 1
What Are Filter Lists, and Why Are They at Risk?

Security suites and browser extensions rely on filter lists, but their future is far from certain. Here's why.

By 
numerous servers lined up 1
VPN
What Is VPN Obfuscation and Why Is It Important?

VPN obfuscation disguises VPN traffic as normal web traffic and helps users bypass VPN blocks. Learn how it's done and why you need it.

By 
Man Standing on a Cliff Infront of Seashore and Houses 1
Is Trip.com a Legitimate Travel Business?

Looking to go on vacation? You might've stumbled across Trip.com, but is it a legit company to use? Is it trustworthy?

By 
How to Configure Microsoft Word to Open Email Attachments in Reading View on Windows 1
How to Configure Microsoft Word to Always Open Email Attachments in Reading View on Windows

Suspicious of Word documents in your email attachments? Here's how to automatically open them in reading view on Windows.

By 
A padlock with codes placed on a keyboard beside a card with a chip 1
What Is a Time-Based One-Time Password and Should You Use One?

How can you provide further security for your online accounts? Additional authentication using a TOTP might be the answer.

By 
spam email coming out of computer with surprised man feature 1
What Is a Spam Bot and How Do You Stop Them?

Have you spotted loads of suspicious comments on websites, social media, and instant messaging platforms? Spam bots might be the reason.

By 
workplace environment desks 1
What Are the Security Risks Associated With Quiet Quitting?

Quiet quitting is harmful for productivity and success, but it can also be a threat to your company's security. Here's what you can do.

By 
A hand holding a phone displaying a record of calls and messages 1
What Is a Pretexting Attack and How Can You Protect Yourself?

Anyone can fall for a pretexting attack, which means hackers can steal your precious personal data. Here's what you need to know.

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
Island Hopping Attacks: What They Are and How to Protect Yourself

Two of the most notable hacks in recent history have been through island hopping attacks. So what are they and how can you stop them?

By 
person holding iphone displayng lockscreen keypad 1
What Is the Smartest and Safest Way to Store Your Passwords?

It's vital you keep login credentials for online accounts safe from cybercriminals. But what's the best way to do that?

By 
Spying 1
7 Types of Passive Attacks That Can Easily Go Undetected

Like a spy lurking in the shadows, those conducting passive attacks don't want you to know they're keeping an eye on you.

By 
A Bitcoin token 1
4 Security Threats to Blockchain Networks You Need to Know About

Thinking of investing in cryptocurrency? You first need to know about the security risk posed to blockchain networks.

By 
A man stretching out to touch an email icon  1
Secure Email Gateways: Your First Line of Defense Against Email Security Threats

Cybercriminals increasingly attack via email, so what can you do to protect yourself and your business? A Secure Email Gateway is the answer.

By 
An image of the Discord logo on a black tablet 1
The Dangers of Discord: What Is a Discord Virus?

Discord is a fun place to chat with friends. Unfortunately, that also makes it an attractive place for people looking to take advantage of others.

By 
Person with Mask Sitting on Chair In front of a Computer Screen  1
4 Types of Active Attacks and How to Protect Against Them

Active attacks are direct efforts to circumvent someone's online defenses. When you know what to look for, you can better beef up your own security.

By 
A command line interface displaying a malicious code 1
Why You Should Update File Sharing Platform, Samba, Right Now

Vulnerabilities have been found in Samba, software that lets you access shared files. So here's why it's vital you install these updates.

By 
iPhone-submerged-in-water 1
What Is a Watering Hole Attack and Are You at Risk?

Imagine a watering hole in the wild. Predators can target their prey by converging on such a site. An online watering hole works similarly...

By 
14 15 16 17 18
Page 16 / 75