MUO

Online Security

Page 4

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a person taking out a single file from a document 1
What Is a Directory Traversal Attack and How Can You Prevent It?

You don't want an unwelcome visitor traversing through your server's filesystem, but attackers have found a way to pull this off. What can you do?

By 
person wearing and using smartwatch  1
Can Smartwatches Be Hacked?

It's not just PCs and smartphones that can be targeted by cybercriminals. Your smartwatch can also be hit by malware.

By 
A magnifying glass pointing to insider threat.  1
Are Risks, Vulnerability, and Threats the Same Thing in Cybersecurity?

Cybersecurity terms aren't interchangeable! Here are the differences between threats, vulnerabilities, and risks, explained.

By 
Grayscale Google logo with a recycle logo overlay over a December 2023 Google calendar background 1
Why You Need to Sign Into Your Google Accounts at Least Once Every Two Years

You've likely heard that signing in to your account regularly is important, but that's especially the case with Google's new account deletion policy.

By 
Yahoo logo is seen on a purple background with faded mail symbol 1
Don’t Fall for This Yahoo Mail Phishing Scam

Received a warning email from Yahoo? It might be a phishing scam. Here's what you need to know.

By 
Photo Of Woman Holding Mug In Front of Computer 1
The Hacking Business Model: How Attackers Bag $20 Million Per Month

Hackers are bad news, but how do they actually make money? Here are a few ways you could be targeted by cybercriminals.

By 
Person holding a smartphone in hand and connecting to a network 1
VPN
The 6 Best VPNs for Unlimited Simultaneous Connections

Are you looking for a VPN to protect all the devices in your household? These VPNs let you stream and browse on as many devices as you want at once.

By 
PS4 controller on top of a slim PS4 console 1
How to Set Up Two-Step Verification on Your PlayStation Account

Here's how to use two-step verification to protect your PSN account.

By 
Smartphone with the WhatsApp app logo on display 1
10 Ways Your WhatsApp Messages Can Be Hacked

Think WhatsApp's message encryption makes it secure? Here are several ways your WhatsApp can be hacked.

By 
facebook-secure-tricks 1
Your Facebook Account Was Hacked? 4 Things to Do Immediately

Suspect your Facebook account was hacked? Learn how to find out for sure, and steps you should follow to fix it.

By 
Woman working on laptop at home 1
What Is SASE Security and Why Do You Need It?

SASE saves you the time and effort of having to implement many separate security solutions one at a time.

By 
gmail logo on an iphone 1
How Will Google’s Gmail Dark Web Monitoring Help You?

Gmail users in the US can now monitor email address breaches, with the feature set to roll out across the world soon. Here's what that means for you.

By 
3D cryptocurrency rendering design 1
What Are Crypto Pump-and-Dump Schemes and How Can You Avoid Them?

Make sure you take these precautions and don't fall prey to the pump-and-dump schemes.

By 
amazon web services logo on top of containers 1
How to Secure Your Data With AWS Container Security

AWS container security can help protect your data and provide other efficient services at the same time.

By 
Sad woman staring at a laptop  1
What Is a Multi-Vector Attack and How Can You Prevent It?

Learn about the ins and outs of multi-vector attacks and discover effective ways to safeguard against them.

By 
Anonymous hacker's face in a black hoody with a PC on the table 1
How Do Data Breaches Happen? 6 Variables to Watch Out For

We hear about data breaches all the time, but they aren't all conducted in the same way. How are attackers getting their hands on so much data?

By 
Man with handcuffs in jail holding remote 1
5 Reasons Why Using Illegal IPTV Streams Is a Bad Idea

Illegal IPTV streams are easy to use but can lead you into trouble. Here's why you should avoid illegal IPTV streams.

By 
a blue laptop on a table next to a white notebook 1
7 Cybersecurity Tips for Digital Nomads

Here's how to keep your devices and personal data secure, no matter where in the world your travels find you!

By 
Desktop computer with AI symbol and illustration  1
AI Content Detectors Don’t Work, and That’s a Big Problem

Looking to check whether something has been created by artificial intelligence? Detectors often don't work and that's bad news for your security.

By 
An image of the Google homepage 1
Why Google Is Changing the Padlock Icon That Tells You Websites Are Secure

Google is changing the padlock icon in Chrome that identifies which websites are secure. But why is the brand making this change?

By 
2 3 4 5 6
Page 4 / 75