MUO

Online Security

Page 28

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
google logo in eye 1
8 Signs That Your Google Account Has Been Hacked

Google accounts are massive targets for hackers because they unlock so many opportunities. Here's what you need to look out for.

By 
fingerprint secure scanning 1
What Is Fuzzing in Cybersecurity?

Fuzzing is a technique used by both security experts and hackers to find vulnerabilities in software. Here's what you need to know.

By 
splintered data cells 1
What Is Network Segmentation and How Does It Improve Security?

Imagine the damage a hacker could cause if they got access to your whole system. Fortunately, network segmentation can ease your worries.

By 
padlocked security device 1
What Is Conti Ransomware and What Makes It Different?

Infamous for taking down large corporations and countries alike, Conti Ransomware has slowly grown in popularity. Here's everything you need to know.

By 
bitb attack (1) 1
What Is a Browser-in-the-Browser Attack and How Can You Protect Yourself?

A clever phishing tactic steals your login credentials when you sign in using associated accounts like Google and Facebook. Here's how.

By 
A computer with some code in the screen. 1
Sandboxes, Honeypots, Software Containers: What Do They Mean?

Sandboxes, honeypots, and containers are three popular prevention and analysis technologies. But how do they differ and which should you use?

By 
what are encrypted messaging apps 1
The 8 Best End-to-End Encrypted Cloud Storage Providers

Looking for a cloud storage service/ Make sure your data is secure with a provider that encrypts all your private information.

By 
Image of code on a laptop for encryption  1
What Is AES-256 Encryption? How Does It Work?

It's often touted as the most secure form of encryption, but how does AES-256 protect your privacy?

By 
grey alert logo in front of code on laptop 1
What Is Grayware and Is It Dangerous?

Grayware can be a confusing term, so what actually is it? Is it worse than malware? And what does grayware actually look like?

By 
Fire flames on black background. 1
What Is a Next-Generation Firewall (NGFW)?

An NGFW is part of the third generation of firewalls, so what do they actually do? Do they only serve to protect the cloud?

By 
emails leaving laptop with hazard logos 1
What Is Clone Phishing?

A lot of people are aware of phishing but don't know all the variations of it. So here's what you need to know about clone phishing.

By 
bitcoin coin cryptocurrency 1
What Are Crypto Cloud Mining Scams?

Looking to invest in cryptocurrency? The industry is already rife with scams, so here's how to avoid cloud mining scammers.

By 
bitcoin logo within solar eclipse 1
What Is an Eclipse Attack in Crypto?

Although rare, an eclipse attack can have significant consequences.

By 
common-encryption-types 1
5 Common Encryption Types and Why You Shouldn't Make Your Own

Is it a good idea roll your own encryption algorithm? Ever wonder what types of encryption are the most common? Let's find out.

By 
An illustration of email in transit 1
6 Key Features to Expect From Secure Email Providers

Want to keep your emails secure and private? You need a secure email provider. Here's what to look out for.

By 
Macbook on table 1
How to Protect Your Apple ID Account With Two-Factor Authentication

Apple’s two-factor authentication lets you better protect your Apple ID. Here’s how to set it up and ensure you don’t get locked out.

By 
stacking passwords login credentials 1
What Is Account Pre-Hijacking and How Does It Work?

You could fall victim to a scammer before you even sign up for an account on popular websites. Here's how it works and how to protect yourself.

By 
Photo of a computer with password manager logo overtop 1
Why Does NordPass Keep Asking Me for My Master Password?

Does NordPass ask you your Master Password every time you try to use it? Here's how to change the Autolock feature.

By 
A large JavaScript logo on a blue background 1
Does Disabling JavaScript Protect You From Hackers?

Hackers can insert malicious code into websites, but does this mean you should disable JavaScript? Will blocking JavaScript really help?

By 
An upclose shot of a woman typing on a silver laptop with a blue stethoscope next to it 1
Why You Should Keep Your Health Records Safe

With all these health and telemedicine apps available today, it's of utmost importance to protect your health records.

By 
26 27 28 29 30
Page 28 / 75