MUO

Online Security

Page 19

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Mockup of Laptop Showing the Pop-up of Click Allow if You are Not a Robot  1
Is the “Click Allow If You Are Not a Robot” Pop-Up Safe? What You Can Do About It

Staying safe online has a lot to do with telling the difference between what is real and what is fake. But if you judge wrong, all is not lost.

By 
A Computer Screen with a  1
Form-Grabbing Malware: A Silent Threat to Your Online Security

Form-grabbing malware can be more effective than keyloggers, but there are many ways you can protect yourself and your personal data.

By 
rifling through ream of paper 1
How to Back Up and Print Your GnuPG Key to Paper

You don't have to store a backup digitally. Using paper might even be safer. Here's how to back up your GnuPG key the old-fashioned way!

By 
graphic illustration of someone trying to login on a computer 1
Everything You Need to Know About Wi-Fi Captive Portals

You've probably seen a Wi-Fi captive portal page when connecting to public Wi-Fi, but have you ever wondered why? Here's the answer.

By 
padlock on laptop keyboard 1
How to Generate Your Own GnuPG Key

By creating your own GnuPG key, you can encrypt your important files and correspondence. And it's not as difficult as it sounds. Here's what to do.

By 
Woman Working on a Computer Outside 1
What Is an Evil Twin Attack and How Can You Prevent It?

Do you often use public Wi-Fi? You might fall for an evil twin attack. So what is it? And how can you stay safe?

By 
person logging into instagram on phone with google authenticator logo in front 1
Lost Your Phone With a Google Authenticator App? What to Do Next

Lost your smartphone and, with it, the Google Authenticator that lets you sign in securely to various accounts? Here's what you need to do.

By 
cyberattacker on laptop 1
What Is a Sybil Attack and How Does It Affect Blockchain?

The so-called "Sybil attack" can cause havoc on a blockchain, so what actually is it? And how can crypto-enthusiasts protect themselves?

By 
 1
7 Scams to Watch Out for on Black Friday and Cyber Monday

While you shop for deals this Black Friday and Cyber Monday, scammers will be looking for YOU. Here's how to shop safely online.

By 
A Christmas tree is seen on a computer screen 1
Cyberattacks Surge During the Holiday Season: Here’s Why

Cybercriminals don't take the holiday season off. Here's why cyberattacks increase over the festive period.

By 
Graphic representations of security features on several phones 1
How Out-of-Band Authentication Helps You Stay Safe Online

Out-of-band authentication is an increasingly common way of protecting your online accounts, one you've likely encountered without realizing it.

By 
online-shopping-terms 1
23 Crucial Online Shopping Terms Every Modern Shopper Needs to Know

Online shopping is more popular than ever, but can be overwhelming with all the different terminology.

By 
e-commerce mobile shop 1
8 Tips to Spot Scam Products When Shopping Online

How can you tell a fake product from a legitimate one when doing your online shopping? Here are a few tell-tale signs of scam items.

By 
device webcam 1
Should You Always Put Tape Over Your Laptop Camera?

Don't like the thought of a hacker watching you through your webcam? Then you might consider covering it up. But how? What should you use?

By 
Black router with a security symbol 1
Static vs. Dynamic IP Address: Which Is More Secure?

Hackers can trick you using IP snooping, but with static and dynamic IP addresses available, which one offers the best protection?

By 
mcafee and norton logos on grey shield 1
Norton vs. McAfee: Which Internet Security Suite Is Better?

Looking for a good antivirus? Norton and McAfee are both strong options, but which one is better? We compare prices, features, and more.

By 
Laptop indicating a threat has been detected. 1
How to Choose the Best Antivirus for Your Device

Not sure what to look for in a security suite? Here's how to find the right antivirus for your PC, laptop, smartphone, or handheld device.

By 
Man writing code on a laptop computer 1
What Are Bug Bounty Programs? Here's Everything You Need to Know

Have you found a flaw in a system or product? Want to know how ethical hackers actually make money? That's where bug bounties come in.

By 
Paper bats against orange background 1
What Is the BatLoader Malware and How Does It Work?

This scary malware is spreading through fake adverts for real products. Here's everything you need to know about BatLoader.

By 
An illustration of Malwarebytes vs Norton 1
Malwarebytes vs. Norton Antivirus: Which Is Best for Tackling Malware on Your PC?

We compare two of the best known antimalware solutions, so which is better: Norton Antivirus or Malwarebytes?

By 
17 18 19 20 21
Page 19 / 75