MUO

Online Security

Page 37

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
multiple spam warning signs 1
How Do Email Spam Filters Work and Why Do You Still Receive Spam?

Even with a spam filter switched on, your inbox is filled with junk mail. What gives? Why do you still receive spam?

By 
man in a dark room with purple backlighting at a desk typing on his computer 1
How Does Live Hacking Work?

Not all hackers are malicious. Live hacking events are a great way to expose vulnerabilities and encourage the cybersecurity community.

By 
Graphic illustration of a hacker juxtaposed against a gavel 1
How to Police Hackers: Inside the Dark Web’s Justice System

If two cybercriminals have a dispute, how can the disagreement be settled? Even the dark web has a justice system...

By 
microsoft edge logo 1
What Is Super Duper Secure Mode in Microsoft Edge?

Microsoft Edge might not have the best reputation, but its security enhancements are worth looking into. Here's what you need to know.

By 
white toy robot looking back at camera 1
What Are Bad Bot Attacks?

Not all bots are the same! So what are bad bots, why do they account for so much traffic, and how do they affect your online activities?

By 
hooded hacker in front of a giant screen 1
The 4 Biggest Hacks of 2021 (and What We Can Learn From Them)

From ransomware to cryptocurrency, here are some of the biggest hacks of 2021 and what regular users should learn from them.

By 
black iPhone with a folder of social media apps 1
How Often Are Social Media Accounts Hacked?

How frequently do social media profiles like Facebook, Twitter, and Instagram get hacked? And how can you stop yourself being a target?

By 
child playing an online computer game 1
What Parents Need to Know About Online Grooming

How do groomers take advantage of children? And how can you protect your kids from online threats? Here's what you need to know.

By 
phone security privacy 1
What Is Obfsproxy and What Is It Used For?

What happens when Tor traffic is blocked? Can you make your data look like standard HTTPS? That's where Obfsproxy comes in...

By 
Login Portal 1
What Is a Password Policy and Why Is It Important?

Keeping yourself safe online is crucial, and a password policy can help you achieve that.

By 
laptop with facebook icon on screen 1
5 Ways to Secure Your Facebook Account for Recovery

There are certain precautions you can take to make your Facebook account is secured for recovery in case you lose access or get hacked.

By 
internet security alert 1
What Is Alert Fatigue and How Can You Prevent It?

This is why false positives, and overly sensitive security software, can actually be detrimental to businesses.

By 
pcloud google drive 1
pCloud vs Google Drive: What Should You Choose to Keep Your Files Private?

Storing your files online is crucial, but what's the best way to do it?

By 
Man working on a laptop.  1
What Is Log4j? How to Protect Yourself From the Log4j Vulnerability

One of the biggest security vulnerabilities of recent times, Log4j could have serious repercussions. So how can you protect yourself?

By 
MacBook with two padlocks on it. 1
Mac
The 5 Best Authenticator Apps to Generate 2FA Codes on Mac

These Mac two-factor authentication apps bring 2FA right to your desktop and help you secure your online accounts.

By 
Man Browsing on iPad 1
What Is a Privacy Program and How Can You Make One?

Users need to know they can trust a website or business with their important data. That's where a privacy program comes in handy.

By 
ip address hide 1
10 Reasons to Hide Your IP Address

Online privacy has become a bigger talking point in recent years. Here's why it's worth hiding your IP address.

By 
Google Chrome Browser 1
Update Chrome to v96.0.4664.110 Now to Fix a Critical Security Issue

Make sure you apply Chrome's latest update as soon as possible, to patch five serious flaws.

By 
Brave and Microsoft Edge Head-to-Head 1
Microsoft Edge vs Brave: What Should You Choose as Your Default Web Browser?

Brave and Microsoft Edge are two of the most popular web browsers, but is better?

By 
what is split tunneling 1
What Is Split Tunneling and Should You Use It?

Split tunneling is a useful feature of some VPN services. So what does it actually mean? How do you use it? And which VPNs actually offer it?

By 
35 36 37 38 39
Page 37 / 75