MUO

Online Security

Page 32

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
virus spreading between computers 1
Why You Have a Responsibility to Keep Your Computer Secure: 6 Reasons

Keeping your devices free of malware isn't just smart; it's a duty. Here's how your infected machine can also hurt friends' and family's computers.

By 
webcam on PC 1
12 Ways to Keep Your Privacy on Zoom and Other Video Conferencing Platforms

Do you use Skype, Zoom, or another video conference app? Here are some simple but vital ways to keep your info private and connection secure.

By 
anonymous cybercriminals email 1
Your Workplace Is at Risk: How to Prevent Business Email Compromise Attacks

Almost every business uses emails, and that means they're a big target for cyberattacks, including BEC. So what is BEC and how can you mitigate it?

By 
salt-in-shaker 1
What Is Salting in Password Security and How Does It Work?

You might've heard of the term "salting" when it comes to securing passwords, but what is it and how does salting actually work?

By 
vpn behind no access logo 1
8 Places Where VPNs Are Illegal or Restricted

If you're travelling abroad, you might not be allowed to use a VPN. Here are some places using such encryption is banned or restricted.

By 
WordPress vulnerabilities 1
WordPress Plugins and Themes Could Have Vulnerabilities: How to Secure Your Site

WordPress itself might be safe, but the plugins used to maximize your blog's potential might lead to cyberattacks. Here's what you need to know.

By 
Cartoon fire next to a brick wall 1
Why You Should Use the TinyWall Firewall

Want to take control of your firewall? With TinyWall you can configure the Windows firewall just the way you want.

By 
Person Holding Laptop Saying You Have Been Hacked 1
9 Signs Your Social Media Accounts Have Been Hacked

Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these signs.

By 
suspicious man hiding behind white mask 1
What Is a Ransomware Gang and How Dangerous Are They?

Ransomware attacks on large-scale organizations require group effort and months of planning. Here, you'll learn everything about ransomware gangs.

By 
G Suite on Phone 1
5 Reasons Why Google Drive Is a Security Risk

Google Drive is a great cloud storage solution, but can you trust it with your private data?

By 
vpn active on tablet screen 1
Single vs. Double vs. Multi-Hop VPNs: Which Is Better?

Most people only use a single VPN, but is that enough to protect your security and privacy? Or are double or multi-hop VPNs better?

By 
vpn deactivated on laptop screen 1
What Happens When You Turn Off Your VPN?

What happens if your VPN suddenly disconnects? Is your data exposed? And if so, how can you still protect yourself without a VPN?

By 
Antivirus software program illustration 1
Why Installing an Antivirus Suite Isn't Enough

Antivirus security software is essential, but won't protect you from all threats. Here's why an antivirus sometimes slips up and what else you need.

By 
Human brain with question marks in bubbles 1
How Do Cybercriminals Bypass Security Questions?

Hackers do find ways to answer your security questions to access your accounts. But how? Surely they're uniquely personal to you?

By 
USB flash drive, memory card, CD, and hard drive 1
How to Maintain an Effective Backup Schedule (and Why You Should)

Bored of regularly backing up your personal information? It's a crucial bit of maintenance, so here's how and why you need to back everything up.

By 
silver MacBook resting on white desk near desktop computer and showing colorful coding 1
Are No-Code and Low-Code Development Platforms Secure?

No- or low-code environments are great for businesses with little tech expertise, but are they really safe for you to use?

By 
pentesting-1 1
The 8 Most Vulnerable Ports to Check When Pentesting

Pentesting is used by ethical hackers to stage fake cyberattacks. If you're attempting to pentest your network, here are the most vulnerably ports.

By 
Gmail loading up on a silver mac laptop 1
Everything You Need to Know About Gmail’s Login Security Warning Alerts

Google's login security alerts in Gmail can be pretty annoying, but is it a good idea to try and disable them? Let's dive in and find out.

By 
MacBook Pro backing up files on an external drive 1
Here's Why You Need to Store Back-Ups on External Devices

Regularly backing up your data can be a headache. But it's certainly worth your time. Here's why you need back up files and unplug the device too.

By 
vpn activated on laptop screen 1
How a Double VPN Can Keep Your Activity More Private Online

Some services offer an added layer of encryption through double VPNs. But what actually happens if you use two VPNs? What does this mean?

By 
30 31 32 33 34
Page 32 / 75