MUO

Online Security

Page 40

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Illustration of a padlock on a circuit 1
What Is Polymorphic Malware?

Polymorphic malware is far from uncommon. But what exactly is it?

By 
google account eye 1
8 Ways Your Google Account Can Be Hacked

Your Google account holds a massive well of data, and that makes it a big target for cybercriminals. Here's how hackers target your account.

By 
padlock on a laptop signifying authentication 1
Authentication vs. Authorization: What is the Difference?

Confused between authentication and authorization? Discover the difference between the two to better understand cybersecurity.

By 
security-checks 1
11 Security Checks Everyone Should Perform Regularly

Security doesn't have to consume your time. Spend a few minutes here and there on these important security checks to protect your online life.

By 
many-people-on-metro-with-yellow-poles 1
How Secure Is Your Data While You're Using Public Transportation?

Whether you're taking a subway train, bus, or airplane, you need to know about your security and privacy. So what risks does public transport pose?

By 
Orange and White At Icon Symbol 1
5 Ways Email Lookup Tools Can Make Networking Safer

How can you tell whether a new contact is legitimate? Email lookup tools are simple and effective. Here's why you need to start using one regularly.

By 
online security privacy 1
5 Cybersecurity Myths That Make You More Vulnerable to Attacks

A lot of conflicting information exists about cybersecurity. So, what shouldn't you believe?

By 
Home office 1
What Is Endpoint Security and Why Is It Important?

Organizations face an increasing number of cyber threats. How can endpoint security help out?

By 
Woman on Instagram 1
6 Instagram Scams and How to Avoid Them

Scammers are even using Instagram to steal information about users. Here are some scams you need to watch out for.

By 
cable-network-with-various-colored-wires 1
4 Cloud Storage Security Issues We're Still Facing in 2021

Most of us use cloud storage services to keep our data secure. But there are still plenty of security challenges we face right now.

By 
Illustration of a VPN lock on a computer 1
Should You Use a VPN Extension or the Client App?

Not sure whether to use a VPN app or a browser extension? We compare their pros and cons to help you choose the one that meets your needs.

By 
hacker phishing security 1
5 Ways Your Amazon Account Can Be Hacked

If a cybercriminal gets into your Amazon account, they could cost you a fortune! So how can hackers get into your account, and how can you stop them?

By 
isp carrier cybersecurity 1
Does Your ISP or Mobile Carrier Pose Biggest Cybersecurity Risk?

Generally speaking, we tend to trust our ISPs and smartphone carriers. But are they part of the problem?

By 
Signing in to a Microsoft account 1
How to Use the Microsoft Authenticator App

Fancy leveling up your security game? Microsoft's Authenticator app can help with that.

By 
Photo of the Apple Park in California 1
The End of an Era: Is Big Tech in Trouble?

Many governments have grown tougher on big technology companies. Is this the end of an era for them?

By 
antivirus security protection 1
Norton and Avast Merge: What Does This Mean for Online Security?

As two antivirus giants merge, you might be wondering what this means for customers. And what does it mean for the cybersecurity industry?

By 
typing on laptop 1
What Is Typosquatting? How to Protect Yourself Against It

A form of URL hijacking, typosquatting targets people who accidentally mistype a website address into the browser.

By 
linking vpn tunnels across the world 1
VPN
What Is the Best VPN Extension for Mozilla Firefox Browser?

Need a VPN extension for Mozilla Firefox browser? Here are the best VPN extensions and how to get started with them.

By 
cybersecurity-goals 1
How to Set and Achieve Your Cybersecurity Goals

You don't need to be put off by the idea of implementing strong cybersecurity measures. Here's how to make your systems secure and why you need to.

By 
encryption-terms 1
12 Basic Encryption Terms Everyone Should Know by Now

Everyone's talking about encryption, but finding yourself lost or confused? Here are some key encryption terms you need to know.

By 
38 39 40 41 42
Page 40 / 75