MUO

Online Security

Page 3

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
image of black samsung solid state drive 1
Hardware vs. Software Password Storage: Which Is Safer?

What is the best way you can store your login credentials? There are software and hardware options, so which is more secure?

By 
password protection screen shown on macbook screen 1
5 Ways to Keep Your Passwords Safe

Login credentials are essential for all secure accounts, but how can you keep them safe? And which storage methods should you avoid?

By 
secure your iphone using a vpn 1
VPN
How to Turn Off a VPN on iPhone

Yes, they keep you more secure, but VPNs can also restrict your browsing experience. So here's how to disable and reactivate your VPN on iOS.

By 
a padlock on a computer keyboard 1
How to Create a Self-Signed Certificate With OpenSSL

Show visitors to your site that you take their security seriously by creating your own SSL certificate using OpenSSL.

By 
magnifying glass over a grey laptop keyboard 1
5 Free Online Sandboxing Tools to Test Applications and Files for Malware

Online sandboxing tools let you analyze malware without exposing your PC to danger.

By 
Man working on a computer in the office  1
10 Common Myths About Penetration Testing Debunked

Penetration testing is a key way to keep your information secure, but many of us make quite a few false assumptions about it.

By 
A laptop showing google's homepage with chrome 1
Is Google Chrome Listening to You?

Google Chrome is the most widely used web browser, but is it secretly listening to its users?

By 
a red digital scam alert graphic with binary code in background 1
Is That Celebrity Giveaway Ad Legitimate or a Scam?

Is a famous face encouraging you to take part in a giveaway via a convincing video? It's likely a scam. Here's how to tell.

By 
green matrix background and white vpn graphic 1
VPN
5 Things a VPN Can Hide, and 5 Things That It Cannot

A VPN is a useful tool to help protect your privacy, but there are various types of web activity that others can still monitor.

By 
Desktop Monitor Placed on a Table Showing Image of a Man Viewing From a Binocular Covered With Facebook Logo Icons 1
Is the "Facebook Protect" Email From "Security@facebookmail.com" Legitimate?

Have you received an email stating that you need to use advanced security via Facebook Protect? You might think it's a scam. Here's how to tell.

By 
twitter app open on phone in dark room 1
Twitter's History of Security Lapses and How They Affected Users

Twitter's suffered many data breaches in the past, affecting millions of users. Only by knowing of these breaches can you protect yourself in future.

By 
An illustration of mobile malware attack 1
What Is Goldoson Malware, and How Can You Protect Yourself From It?

A duplicitous type of malware infected potentially millions of Android devices via the Google Play store. Here's what you need to know.

By 
 1
7 Easy Ways to Find Out Who's Searching for You Online

Concerned that people are looking for you? Here are the online tools you can use to trace new mentions of you and find who's looking for you.

By 
Card Having a Question Mark Attached to a Key 1
Can You Trust the Security of Password Managers?

For the most part, yes. But be sure to do your homework beforehand. Some password managers are safer than others.

By 
Windows logo seen on blue background 1
Are Windows License Key Activation Programs Safe?

Sometimes trying to save money isn't worth the risk.

By 
Google Photos icon in 3D 1
5 Privacy and Security Risks of Using Google Photos

Google Photos comes pre-installed on most Android devices and Chromebooks, but it's not the safest way to manage your photos.

By 
The Lego man is sitting in front of the computer and trying to remember his password 1
5 Secure Password Alternatives You Should Consider

If a hacker founds out your login credentials, they could access all your data. So if passwords are the problem, how can we go passwordless?

By 
shops spending spree sunglasses 1
Is Shein Legit and Safe to Shop At?

Shein offers low prices on clothing, but is Shein a legit and trustworthy website to shop at? Here's what you need to know.

By 
engineer monitoring ssh logins on linux 1
How to Prevent Brute-Force Attacks on Linux Using Fail2ban

Reduce the chances of hackers gaining access to your Linux servers by installing and configuring Fail2ban.

By 
blue digital graphic of login credentials and fingerprint 1
What Is the Safest Password Manager to Use?

Looking to keep your login credentials secure? You need to know the safest password managers for Windows, Mac, iOS, Android, and more.

By 
1 2 3 4 5
Page 3 / 75