MUO

Online Security

Page 27

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A purple team working in a room 1
What Is a Purple Team in Cybersecurity?

You might have heard of the numerous cybersecurity teams working behind the scenes of a business. So what does a purple team actually do?

By 
cyberattacker on laptop 1
What Is a Gray Hat Hacker?

You may have heard of black and white hat hackers, but what does a gray hat hacker do? Let's find out.

By 
 1
Create a CAPTCHA Validation Form Using HTML, CSS, and JavaScript

Secure your websites with CAPTCHA validation.

By 
padlock in data swarm 1
Why VPN Services Are Shutting Down Their Indian Servers

VPN services are up in arms against a new law introduced by CERT-In. Learn how it compromises users' privacy and how VPN companies are reacting to it.

By 
Apple Passkeys homepage for developers 1
How Do Apple Passkeys Work? How Do They Keep You Secure?

Are you ready to say goodbye to traditional username and password combinations? Apple might just have the answer.

By 
phishing hook stealing email on laptop  1
The Top 7 Signs of a Phishing Scam

How do you spot a phishing email? What if a scam message comes through via social media? Here are some tell-tale red flags.

By 
Logos of Firefox, Pale Moon, Tor and Brave browser are seen on a black background 1
What Is the Most Secure Browser for Windows?

You're likely viewing this using Google Chrome, but that's not necessarily the most secure or private browser. Here are some great alternatives.

By 
Lock on a keyboard with Linux Tux 1
6 Reasons Why Linux Doesn’t Need an Antivirus or Firewall

Linux is more secure than other operating systems. But that's not the only reason why you might not need an antivirus or firewall while using Linux.

By 
red world map behind green binary code  1
The Top 4 Ways That Malware Spreads

You should've heard about the devastating effects of malware, but how can it actually spread between devices?

By 
Private sign on fence 1
How to Create an Internet Shortcut on Windows That Opens in Private Browsing Mode

Whether you’re concerned about privacy or simply like browsing the web in private mode, here’s an easy way to achieve this.

By 
Computer code on a screen with a hooded person  1
What Is the YTStealer Malware and What Does It Do?

This malware can steal your YouTube account and sell it on the dark web. Here's what you need to know about YTStealer malware.

By 
Windows Laptop with Microsoft Defender Logo on Screen 1
Is Microsoft Defender Good Against Ransomware? Definitely, Says AV-TEST

The institute gave the antivirus full marks for its effectiveness in stopping ransomware attacks.

By 
anonymous hacker computer PC 1
What Is Cross-Site Scripting (XSS) and Why Is It a Security Threat?

Cross-site scripting vulnerabilities remain a massive cybersecurity threat. So what are XSS attacks? How can you prevent them?

By 
ghosting smartphone public 1
5 Ways Hackers Use Public Wi-Fi to Steal Your Identity

Love using public Wi-Fi? So do hackers! Learn how cybercriminals can access your private data while you use public Wi-Fi.

By 
Computer code on a screen with a hooded person  1
The Best Antivirus Apps for Windows 11

Keep your Windows 11 PC safe with these free and paid antivirus apps.

By 
skull in code next to water droplets 1
What Is Leakware? Here's What You Need to Know

Leakware is ransomware with an extra-scary caveat. So what is it? And how can you protect yourself from cybercriminals using leakware?

By 
person using phishing hook on man using laptop 1
What Is Double Barrel Phishing and Is It Dangerous?

Most people are aware of phishing scams. That's why cybercriminals are increasingly moving onto double barrel phishing. Here's what you need to know.

By 
upclose image of a black tesla steering wheel next to a GPS navigation screen 1
Bluejacking: How Bluetooth Can Be Used to Hack Your Devices

Cybercriminals can target you through Bluetooth-enabled devices, from your earphones to fitness trackers, and even your Tesla. Here's how.

By 
Apple's Applications folder icon in macOS Monterey 1
How to Install Third-Party Apps on a Mac

We’ll show you how to install third-party apps on your Mac, both on and off the App Store.

By 
working in an office laptop apple 1
Red Team vs. Blue Team: What’s the Difference?

Red and blue teams are often mentioned in the field of cybersecurity, but what do they actually do? Here's what you need to know.

By 
25 26 27 28 29
Page 27 / 75