MUO

Online Security

Page 38

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
ip spoofing security 1
What Is IP Spoofing and What Is It Used For?

Faking an IP address is a handy technique used by hackers. But what attacks can they carry out, and how do you protect against IP spoofing?

By 
Three locks in order of smallest to biggest 1
What Is NordPass and Why Should You Use It?

How can you keep your login credentials secure and remember loads of unique passwords? Maybe you don't have to, if you use NordPass!

By 
looking for bugs 1
6 Website Malware Scanners to Check If Your Website is Clean

Trying to make sure your website is free from malware and other security threats? Check out these top website malware scanners to quickly find out.

By 
Credit Cards on Keyboard 1
What Is Attack Surface Management and Why Is It Important?

Attack Surface Management (ASM) is an emerging cybersecurity strategy that can help you better manage your online security. Here's why it's important!

By 
lastpass nordpass 1
NordPass vs. LastPass: Which Should You Choose to Manage Your Passwords?

Are you looking for a secure password manager? LastPass and NordVPN are popular choices, but which one is right for you?

By 
up-close photo of turquoise blue eye 1
Are Smart Contact Lenses Safe and Secure?

Companies have begun to develop smart contact lenses. Here's why, plus some security questions developers need to ask themselves.

By 
Two jars filled with honey.  1
What Is a Honeypot and Can It Help Mitigate Cyberattacks?

A bait for luring threat actors, a honeypot is used by cybersecurity professionals to test a network's vulnerability.

By 
Touchscreen Computer Device 1
What Is Session Hijacking and How Can You Prevent It?

A session hijacking is a situation where an attacker hijacks your active web session. Here's how you can prevent it!

By 
VPN illustration 1
8 Bad VPNs You Must Avoid to Protect Your Privacy

We recommend that everyone use VPNs, but not all VPNs are worth using. Here are some of the sketchier VPNs to avoid.

By 
Picture of a laptop on a table 1
What Is Network Scanning and How Does It Work?

Being proactive will help you stop the threat of cyberattacks.

By 
laptop shopping cart trolley money dollars 1
5 Tips to Spot Scam Vendors When Shopping Online

If you stick to known vendors and legitimate websites, shopping online is generally secure. But you should always remain vigilant.

By 
Man near Christmas tree with laptop laying on couch with a credit card in his hand 1
How to Avoid Falling for Skimming Scams This Holiday

Tis the season for giving—and taking! Be wary of skimming scams over the festive period. Here's how to avoid falling victim.

By 
Illustration of a hacker 1
What Is DNS Hijacking and How Can You Prevent It?

DNS hijacking poses a huge threat to internet users. But how can you stop if from happening?

By 
secure file transfer 1
The 7 Best Tools to Securely Share Files With Anyone

Need to send important files to someone? Pick a safe file-sharing platform, so no one can intercept them. Which are the best tools for the job?

By 
avast vs brave 1
Brave vs. Avast Secure Browser: Which Private Browser Should You Choose?

Are you looking for a security- and privacy-focused browser? Brave and Avast are two of the strongest options, but which is right for you?

By 
up-close image of neon blue electronic chip 1
What Is Threat Hunting and How Do You Practice It?

Threat hunting is a great way of detecting vulnerabilities in your system. But what actually is it and how does threat hunting differ from pen tests?

By 
A hand holding a mobile phone which shows the twitter welcome screen 1
How to Change Your Twitter Password

If you suspect your account has been compromised, you might want to change your Twitter account password. Here's how to do it.

By 
Floppy disc with words  1
AIDS Trojan: The Story Behind the First Ever Ransomware Attack

Ransomware is a huge problem now, but what was the very first example of ransomware? How was it deployed? And who created it?

By 
Hacker at a desk laptop 1
6 Types of "Hat" Hackers and How They Operate

Do you know the difference between black, white, gray, red, blue, and green hat hackers? Here's what each type of hacker does.

By 
HTTPS in the browser bar.  1
HTTPS Everywhere Has Turned 10: Here's What's Changed and Why That Matters

A browser extension that encrypts and secures your communication with websites, HTTPS Everywhere has come a long way. But is it bidding farewell now?

By 
36 37 38 39 40
Page 38 / 75