MUO

Online Security

Page 25

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Cartoon hand coming out of a laptop screen catching a ladybug 1
What Are the Risks of Remote Computer Access?

More individuals and companies are using remote access programs, but they do come with security risks. So what can you do to protect yourself?

By 
hacking into bluetooth laptop smartphone coding 1
11 Bluetooth Attacks You Need to Know About

No, even your Bluetooth connection isn't safe from hackers! Here's how cybercriminals can target your Bluetooth-enabled devices.

By 
CamScanner logo seen on light green background 1
Is CamScanner Safe to Use? Here's What You Need to Know

CamScanner is a popular document scanning app, but does it collect data about you? Is it secure? And should you use it for your private information?

By 
iPhone Lockscreen 1
The Advantages and Disadvantages of iOS 16’s PassKeys Feature

Apple plans to eliminate the use of passwords with passkeys, but this implementation is not as perfect as you think.

By 
Hacker at a desk laptop 1
How Hackers Targeted Politicians With a Fake News Site

Hackers used a tried-and-tested phishing scam to deploy malware. So who was targeted? By who? And what did they actually do?

By 
unlocked password login credentials 1
Your Data Is Not Safe if You Use Any of These 20 Passwords

Here's a list of commonly-used passwords that can often be found on dark web lists of hacked accounts. Change your logins if you use any of them!

By 
the word data written along with an asterisk mark 1
What Is Data Leakage and How Can You Prevent It?

We often hear about data leaks in the news. But what does this mean, how does it affect your data, and how can you prevent it?

By 
Fingerprint key on a laptop keyboard 1
Single Sign-On vs. Password Manager: What Should You Use?

Single sign-on solutions and password managers serve the same purpose, but which one finds the perfect balance between convenience and security?

By 
A Woman Reporting Beside The Van  1
13 Online Security Tips for Journalists and Bloggers

Whether you're a journalist, blogger, or are just privacy-minded, here are some top tips to keep your personal data secure.

By 
Monero coin juxtaposed against an image of Spider-Man hanging upside down 1
Spider-Man: No Way Home Torrent Contains Monero Cryptocurrency Miner

The latest malware spread through Marvel Cinematic Universe torrents shows the dangers of illegally downloading movies online.

By 
an envelope spewing trackers 1
How to Try DuckDuckGo's Email Protection Service in Open Beta

DuckDuckGo Email Protection is in open beta and can help strip trackers from your messages. Here's what it is and how to use it.

By 
A twitter bird screaming over a megaphone with a robot on the side 1
What Are the Twitter Whistleblower's Allegations Against the Company?

Twitter's former security chief details his main concerns with Twitter's "extreme, egregious deficiencies" in dealing with hackers.

By 
server units stacked together 1
VPN
How to Choose the Best VPN Server Location

VPN companies offer thousands of servers in scores of locations around the world. Learn how to choose the right server location based on your needs.

By 
Image of palette of primary and secondary colors 1
What Is the Cybersecurity Color Wheel?

Red, blue, yellow, purple, green, orange, and white! These make up the cybersecurity color wheel. Confused by too many colors? Here's what each means.

By 
Firefox and Opera logos seen on black background 1
Firefox vs. Opera: Which Browser Is Better for Security?

Opera and Firefox both have good reputations when it comes to security. But which one keeps your data more secure and private?

By 
Person Holding Silver Smartphone 1
I Have a Cyberstalker: What Can I Do?

Documenting our lives on social media can result in cyberstalking. So what can you do if you have a cyberstalker? How can you protect yourself?

By 
Chain with padlocks on door 1
How to Create a New Password Database Using KeePass

Here's how to set up a new database using the password manager, KeePass; plus, how to make an emergency sheet in case you forget your master password!

By 
anonymous cybercriminals email 1
5 Ways Scammers Can Use Your Email Address Against You

We all know that scammers are lurking online, but what happens if they get a hold of your email address? Here are five things to watch out for.

By 
close up electronics 1
Why Should You Choose RAM-Only VPN Servers?

A VPN with RAM-only servers stores data and all applications in the volatile memory. Learn what it means and how it's different from traditional VPNs.

By 
skull on padlock and chains 1
Everything You Need to Know About the LockBit Ransomware Family

LockBit is a huge threat that uses the Ransomware-as-a-Service model. Here's what you need to know.

By 
23 24 25 26 27
Page 25 / 75