MUO

Online Security

Page 23

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Image shows a man sitting at a desk using the Google spellcheck and writing in a journal 1
Beware! Spellcheck Features in Browsers Could Risk Your Personal Data

Chrome and Edge's enhanced spellcheck features could be leaking your personal data, including passwords.

By 
An image of a cybersquatter on a laptop 1
Lazarus Malware Targets Tech Jobseekers: Here's What You Need to Know

If you're looking for a job via LinkedIn, you could be targeted by scammers looking to take control of your device and data.

By 
Duo Mobile app logo seen on black background 1
What Is Duo Mobile and Is It Safe to Use?

Duo Mobile is an authenticator app that helps you log into accounts safely. But is it actually secure to use?

By 
Mouse pointer hovers over the word security on a screen 1
What Is VoodooShield and How Can It Protect You From Malware?

You can lock down Windows and stop nearly all cybersecurity threats using VoodooShield. So what is it and how does it work?

By 
digital graphic of skull in vector 1
What Is a Hyperjacking Attack and Are You at Risk?

Do you use a virtual machine? You might be targeted using an attack that was seen as theoretical for years before the first confirmed case in 2022.

By 
Logos of VeraCrypt, Authenticator, Signal, Linux Tux, Tor Browser, KeePassXC, and File Shredder (left to right) 1
10 Essential Privacy and Security Apps for Linux Desktops

Want to stay and feel secure while using Linux? Here are some essential privacy-focused apps everyone should have on their Linux desktop.

By 
Silver and black round emblem of bitcoin on a keyboard  1
What Is the CryptoTab Browser? Is It Safe to Use?

Free Bitcoin in your browser? Sounds too good to be true, right?

By 
Lock and asterisks seen over a photo of a server room 1
What Is the Best Enterprise Password Manager?

Looking for the best password manager for your business? Here are the top options, no matter your budget.

By 
map show location dots 1
What Is Shodan and How Can It Improve Your Online Security?

Shodan can be used by hackers to target your devices, but it's not all bad. In fact, it can help you protect from cybercriminals too.

By 
person being scammed by criminal via laptop 1
What Is Consent Phishing and Why Is It Dangerous?

Through this smart phishing scam, cybercriminals gain access to data found on cloud storage apps. So how does consent phishing work?

By 
pile of paperclips behind alert symbol 1
How to Spot and Avoid Malicious Attachments

Malware can be spread via email attachments, but what are the tell-tale signs of a malicious attachment? Here's what to look out for.

By 
Man on Computer 1
What Is Container Security and Why Do You Need It?

Using software in containers is an important step in securing your online environment. So how does container security work?

By 
hacking into an online account laptop 1
Here's What to Do When Your Password Manager Gets Hacked

Can password managers get hacked? And if so, should you be worried? Here's what steps you need to take.

By 
find free wifi 1
What Is Signal Jamming and What Can You Do About It?

Signal jammers aren't just found in films! They can be used in real life too. So what are they? And how can you prevent a signal jam attack?

By 
phishing hook stealing credit card via cookie 1
What Is an Adversary-in-the-Middle Phishing Attack?

AiTM scams can even bypass security precautions like two-factor authentication. So how do these phishing variations work? How can you stay safe?

By 
A Person Sitting on the Floor with Vr Goggles Using a Computer 1
What Are Disassociation Attacks?

This tactic can mean your data ends up in the hands of cybercriminals. So what is a disassociation attack and how can you protect yourself?

By 
Wickr, Wire, Proofhub, Slack logos seen on green background 1
What Is the Most Secure Team Chat App?

Whether you work remotely or just use a team chat app to co-ordinate business, you need to use a secure messaging app to keep data secure.

By 
Image of binary codes in green 1
What Is a Message Digest?

How can you check if a message or any media content sent by a friend is genuine? Message digests could be the answer.

By 
smartphone authenticator app for unlocking laptop 1
The 6 Best Authenticator Apps for 2FA and Other Enhanced Account Security

Looking for the best multi-factor authentication (MFA) apps? Whether you've got an iPhone, Android device, or another system, we've got you covered.

By 
working on numerous screens 1
What Cyberattacks Do Businesses Commonly Face?

It doesn't matter what size your business is: every company can face cyberattacks. So what threats are there? And what can you do?

By 
21 22 23 24 25
Page 23 / 75