MUO

Online Security

Page 18

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A Graphic Representation of Mails Moving from Computer to Bin  1
What Is a Disposable Email Address and Why Should You Use One?

A site asks you for your email address. But you don't entirely trust it. So what do you do? A disposable email might be the answer.

By 
Setting up parental control 1
How to Set Up Parental Controls on Windows 11

Keep your kids safe with Windows 11's parental controls tool.

By 
comparing codes on laptop and PC 1
How to Prevent File Upload Vulnerabilities

Any website that allows users to upload their own files can be attacked by hackers. Fortunately, there are things you can do to secure your site.

By 
Image of a Hacker in Hoodie with a city background 1
The 5 Biggest Data Breaches of 2022

Here are some of the most notable data hacks of the past 12 months, taking into account the number of people affected and the type of info leaked.

By 
Computer screen displaying a  1
Google's "Unusual Traffic" Error: What It Means and How to Fix It

Google might show that its systems "have detected unusual traffic" from your device. Does this mean you're infected with malware? Not necessarily...

By 
man typing coding on computer 1
How to Use Burp Suite's Intruder Tool to Pentest Web Apps

Are you an ethical hacker or pentester? You'll likely have used Burp Suite. So how do you use its Intruder tool to get better targeted results?

By 
Ethereum, Bitcoin, Ripple, Monero logos seen over a photo showing trading graphs on computers 1
Why Do Crypto Companies Keep Getting Hacked?

Cryptocurrency exchanges have lost millions through security breaches in the past decade. So why are they such a huge target for hackers?

By 
 1
The 6 Most Secure Cloud Storage Services

Here are the most secure cloud storage services if you want online storage that's encrypted and safe from prying eyes.

By 
Man in Suit Working in the Office 1
How Vulnerability Disclosure Helps You Stay Ahead of Cyberattacks

Cybercriminals try to exploit vulnerabilities on as many machines as possible. It's vital to disclose and fix issues before they get the chance.

By 
An anonymous cybercriminal, wearing a hoodie, working at a laptop. The scene is dark and the criminal facing us has a large question mark in front of their face. 1
How Do Hackers Make Money, Legally and Illegally?

You're probably picturing a shady hacker stealing your personal information. But how do they actually make money, both illegally and legally?

By 
Woman Working on a Laptop 1
What Is Data Synchronization and Why Is It Important?

Keeping all your data sets in sync is important to combat data losses and breaches. So how does data synchronization work?

By 
a remote worker 1
How to Find Someone's Username Across All Social Platforms

Social Analyzer is a command line tool or web app that feels almost like a super power. Like any super hero, be sure to use your powers for good.

By 
Depiction of an anonymous VPN connection 1
VPN
3 VPN Features You Should Use to Avoid VPN Blocks

VPNs are excellent privacy tools but many countries and online services block VPN traffic. Learn how they do it and how you can bypass these blocks.

By 
A figure with a mask on sitting beside a table and clicking on a computer 1
Don’t Be a Victim of Click Fraud: Here's How to Protect Yourself

Click fraud can be bad both for advertisers and publishers. Know how to gather reliable data and prevent opening your wallet to scammers.

By 
Advent Calendar next to Christmas decorations 1
Security Advent: 24 Lessons to Remember This Christmas

Instead of a little treat each day in December, here's an Advent calendar that helps you build up your personal security, bit-by-bit.

By 
norton and bitdefender logos on blue digital background 1
Norton vs. Bitdefender: Which Security Suite Will Protect Your PC Best?

Two of the best-known antivirus solutions are Bitdefender and Norton, but which is best? We compare pricing, plans, features, and more.

By 
vpn app open on laptop screen 1
VPN
Does a VPN Protect Against Malware?

Do you really need an antivirus suite if you already have a VPN? Is a VPN an all-in-one-security solution? Here's what you need to know.

By 
holiday-shopping-safe 1
10 Tips for Safe & Secure Shopping Online This Holiday Season

The Holidays are almost upon us once again. And that can only mean one thing - yep, its time to buy gifts at the last minute again! But how do you avoid criminals while buying online?

By 
Mastodon logo seen on blurry blue background  1
Is Mastodon a Safe and Secure Alternative to Twitter?

When Twitter get mired in controversy, many turn to Mastodon. But is the latter a service you can trust?

By 
A bomb rigged to explode in four minute 16 seconds 1
Zip Bombs: What They Are and How to Protect Yourself

Rather than blow your PC to bits, these nasty little files can expand to fill your machine with more data than it can handle.

By 
16 17 18 19 20
Page 18 / 75