MUO

Online Security

Page 20

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Man in Green Hoodie and Black Sunglasses Sitting on Orange Chair 1
What Is Credential Stealing? How to Prevent It on Windows

Credential stealing can leave you completely exposed, so wat actually is it? What can you do about it? Here's what you need to know.

By 
Padlock graphic illustration seen on dark blue background  1
What Is the Best Encryption Software?

Looking to render your files unreadable to hackers and other intruders? Here are the best services that encrypt your data.

By 
A laptop computer is seen on a desk during an antivirus scan  1
Free vs. Paid Antivirus Software: Which Should You Choose?

It may be tempting to go for a free security suite, but are paid-for, premium versions that much better? Here's how to decide which is right for you.

By 
A laptop on Christmas morning. 1
How to Spot Mail Fraud and Online Scams This Holiday Season

Mail fraud is rife around the festivities. Here's what to look out for online, so you don't get scammed.

By 
Logos of Edge, Chrome, Safari and Opera browsers seen on dark blue background 1
5 Free Tools to Check If Your Browser Is Safe and Private

Your browser is your first line of defense against hackers and trackers, but how do you know it's doing its job? Here are some free tools you can use.

By 
Server room with cloud, network and computer symbols 1
What Is a Privilege Escalation Attack?

As the name suggests, privilege escalation attacks can become very damaging, very quickly. So what are they? And how are they carried out?

By 
A woman writing in a notebook next to a MacBook 1
5 Reasons Installing Fewer Apps Helps You Stay Safe

Do you really need another app on your device? You might think there's no harm in downloading apps to your heart's content, but you'd be wrong...

By 
blurred photo of blue and purple computer coding 1
7 Common Ways Websites Are Hacked

Websites are always big targets for cybercriminals, but how do they actually go about hacking a site?

By 
Security symbol seen over a photo of a man holding a credit card next to a laptop 1
What Are the Safest Online Payment Methods?

Looking for safe options to pay for your online or even in-person purchases? Here are the four best ways you can keep your finances secure.

By 
A person sitting on chair playing video games 1
7 Tips for Staying Safe While Engaging in Gaming Communities

Social channels related to video games are a good way of enhancing your experience. But they could also leave you open to scammers. Here's what to do.

By 
Photo of Person Typing on Computer Keyboard 1
What Is a Living-Off-the-Land Attack and How Can You Prevent It?

Cybercriminals don't need to install malware onto your system to attack you. They could silently use already existing programs to take control.

By 
Smiling Man on a Laptop 1
What Is Data Profiling and Why Do You Need It?

Data profiling involves the analysis and reviewing of information in your network, but how can this keep your system safe?

By 
Credit cards seen on a circuit board 1
Are Virtual Credit Cards Safe?

Virtual credit cards sound like a great way of staying secure, especially against data thefts. But what are they? Do they have any downsides?

By 
person in a blue shirt using an imac to look at the web page for google vpn imac 1
VPN
Should You Use Google One's VPN on Desktop?

Google Virtual Private Network service is coming to desktop, but it might not be all its cracked up to be...

By 
web-app-increase-security-with-http-headers 1
What Are HTTP Security Headers and How Do You Use Them?

How can you increase the security of your website? Security headers are a great and simple way of keeping your visitors safe from hackers.

By 
Replay symbols shown before a desktop computer 1
What Is a Replay Attack? Here's Everything You Need to Know

It doesn't necessarily matter if you use encryption: you can still fall for this cyberattack, which can see you losing your personal details and cash.

By 
black and white photo of trojan horse 1
What Is a Trojan Horse in Cybersecurity? How Does It Work?

Most people have heard of Trojan malware, but what is it? What are the most prevalent types? And how can you stay safe?

By 
cyber-security-frameworks-for-companies 1
5 Cybersecurity Frameworks Companies Use to Protect Data

Cybersecurity is big business and an ever-growing challenge. Here are some of the approaches companies use to protect information we all store online.

By 
A laptop running code beside flower vases on a counter 1
What Is the VENOM Vulnerability and How Can You Protect Yourself From It?

You might have heard that the VENOM vulnerability might be worse than Heartbleed, but is that true? What is VENOM? What can you do about it?

By 
Semi Transparent Image of Privacy Icon on Circled Pattern  1
What Is an MFA Fatigue Attack and How Can You Protect Against It?

Getting too many push notifications for multi-factor authentication? You might be targeted by hackers using MFA fatigue attacks.

By 
18 19 20 21 22
Page 20 / 75