MUO

Online Security

Page 29

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a boy wearing a red hoodie and headphones doing homwork with his laptop 1
Why Students Are at Risk of Data Breaches (and How to Protect Them)

Educational institutions hold a lot of important data about students, and so they're a big, yet underestimated, target for hackers.

By 
TeamViewer Opened In Laptop 1
6 Ways to Make TeamViewer More Safe, Private, and Secure

It's one of the most popular remote access programs, but is TeamViewer safe to use? Here's how to make it more secure.

By 
iphone safari app icon 1
How to Disable Website Previews in Safari to Boost Your Security

Disabling website previews in Safari stops potentially harmful sites loading content, which can boost your online security.

By 
Person holding smartphone with WhatsApp emoji reactions on the screen 1
How to Create Encrypted Lists, Reminders, and Files on WhatsApp

Are you using a paid-for Notepad app to save your files? Try WhatsApp instead: it's free, easy, and lets your encrypt your files. Here's how.

By 
Image of a steel lock with a laptop 1
7 Cybersecurity Trends You Should Know About in 2022

What are the greatest security threats you face this year? What are the cybersecurity trends helping you fight attacks? Here's what you need to know.

By 
immunify360 1
What Is Imunify360? How Does It Enhance Website Security?

Learn all about Imunify360 and see if this security suite is worth your hard-earned money.

By 
Girl Taking Selfie 1
5 Tips to Make Your Instagram Live Stream Secure

Instagram live streams can damage your reputation in minutes if not planned correctly. But these tips will make sure everything goes smoothly.

By 
Adobe Creative Cloud logo with a background of pink and blue clouds. 1
What Is Zero Trust Network Access?

How do you prevent cyberattacks and data leaks? Zero Trust Network Access could help you secure your systems from inside and outside threats.

By 
facepalm laptop 1
Common Cybersecurity Terms That Are Often Confused

The jargon around cybersecurity is cryptic and confusing, which is exactly what criminals want. But understanding these terms can help you keep safe.

By 
Bitcoin with a lock 1
What Is Digital Asset Security? What Are the Risks Associated With It?

Your digital assets are just as important as your physical assets. But are they as secure as you want them to be?

By 
Girl wearing mask working on a laptop 1
7 Scams and Security Threats that Relied on COVID-19 Fears

Cybercrime has been booming during the pandemic. Here are just some of the most common COVID-19 cyber scams you need to watch out for.

By 
vpn on tablet with money bag icon 1
VPN
How Do Free VPN Providers Make Money?

If you're not paying for the product, you are the product, right? What about free VPNs? How do they make enough money to survive?

By 
hand holding a phone with images of emails flying through the air 1
Tutanota vs. ProtonMail: Which Email Provider Is More Secure?

Both ProtonMail and Tutanota offer top security and privacy features. But which secure email provider should you use?

By 
vpn app active on smartphone 1
VPN
Is a Free VPN Better Than No VPN at All?

You can't afford a paid-for VPN service, so you plump for a free one. But is it really safer to use a free VPN over not using a VPN at all?

By 
laptop with cloud upload symbol on screen 1
How Safe Are Cloud Applications?

Your favorite cloud applications may not be as secure as you'd think. Learn what you can do about it.

By 
A close-up of Instagram being used on an iPhone 1
Instagram Has a Hidden Folder of DMs: How to Find and Use It

Instagram's Hidden Requests folder filters certain messages, hiding them from your main inbox.

By 
windows-firewall 1
Which Free Firewall for Windows Is Best for You?

We place emphasis on antivirus and malware removal, but don't ignore firewalls. Let's take a look at the best free Windows firewalls, comparing ease of setup, ease of use, and availability of features.

By 
website security featured 1
Whitelisting vs. Blacklisting vs. Greylisting: What Are They and Which is Better?

You might have heard the terms, whitelisting, blacklisting, and greylisting (or graylisting), but what do they mean?

By 
Illustration showing popular blockchains  1
6 Ways to Protect Your Artwork from NFT Theft

Artwork theft has become big business as the world of NFTs continues to expand. So, how can you protect your digital artwork from online theft?

By 
secure padlock logo 1
What Is Phishing as a Service and How Does It Work?

Phishing is a bigger threat than ever before, thanks to Phishing as a Service (PaaS). So what is PaaS and how can you stay safe?

By 
27 28 29 30 31
Page 29 / 75