MUO

Online Security

Page 41

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
control D logo black background 1
Everything You Need to Know About ControlD: A VPN Without a VPN App

Looking for the advantages of a VPN without actually using a VPN? ControlD, a free DNS with extra paid-for content, could be ideal for you.

By 
Digital illustration shows a laptop screen with a shield and needle on it. 1
Researchers Catch the AllBlock Adblocker Injecting Ads: Here's What Happened

Imperva Research Labs found an ad blocking extension had duplicitous purposes too. Here's what we can learn from this shocking example.

By 
fingerprint touch face ID 1
What Are Biometrics and How Do They Work?

Biometrics are everywhere: your phone, workplaces, and even the supermarket. But, how do biometrics work, and can you trust them?

By 
Shark-crossing-warning-sign 1
What Is Wireshark and How Can You Use It to Secure Your Network?

This free cross-platform packet sniffer can securely analyze data. Here's how you can use Wireshark to troubleshoot network issues.

By 
A poke ball is seen next to a smartphone  1
The ShinyHunters Hacker Group Collects Data Like Gamers Collect Pokémon

These cybercriminals have hit major companies. You might've even seen their logo: it's the Pokémon, Umbreon. Here's what you need to know.

By 
Illustration of skull with yellow numbers in background 1
What's the Difference Between Malware, Computer Viruses, and Worms?

You've heard of malware, worms, and viruses, but what do those terms actually mean? How do worms and viruses damage your devices?

By 
Image of man starring at a locked laptop computer.  1
The Top 5 Ransomware Removal and Decryption Tools

Hit by ransomware and don't want to pay the ransom? You do have options. Here are some of the top decrypting tools you should consider.

By 
samsung galaxy phones 1
Why You Can't Trust Online Reviews: What Is a Click Farm?

Click farming and click fraud can be serious issues for individuals and big businesses. Here's what they are and how to spot these dubious practices.

By 
Person looking at a computer worried 1
Can Teachers Record Your Online Classes?

Many school classes have moved online, but do teachers have permission to record them?

By 
Internet written on signpost 1
3 Sophisticated Social Media Scams You Need to Avoid

Scammers are growing increasingly sophisticated. Here's a look at some of the newest tactics they employ to defraud people online

By 
security alert screen 1
What Is Ransomware as a Service?

The threat of ransomware has never been greater, and that's partly down to Ransomware as a Service. So what is it and how can you protect yourself?

By 
remember your password 1
How to Remember Passwords Without a Pen and Paper

Weak and stolen passwords are the number one reason behind data breaches. Learn how to remember your passwords securely.

By 
Image of a wallet with cash and Ethereum. 1
How Hackers Hack Crypto Wallets, and How to Protect Yourself

Cryptocurrency wallets are hot targets for hackers. But how do they get into these, and what can you do to protect yourself?

By 
apple stores 1
Apple Tackles App Store Scams With New "Report a Problem" Button

Amid the growing App Store scams and negative publicity, Apple has restored the option to report suspicious apps.

By 
Anonymous hacker's face in a black hoody with a PC on the table 1
8 Historic Data Breaches That Shook the World

Some data breaches have left a significant mark on the planet. But what were the most significant ones?

By 
Screenshot shows blurred MS Word files juxtaposed against the word  1
WastedLocker: A Complex Ransomware Variant That Targets Large Corporations

This strain of ransomware (and its Hades variant) has targeted countless high-profile companies, including Garmin. Here's what you need to know.

By 
Folder and file icons with a question mark are seen on a blue background 1
Downloaded a Suspicious File? Here’s How to Check if It Contains Malware

Accidentally downloaded a file you suspect might be a virus? Or what if you think a link goes to a malicious site? Here's what to do.

By 
 1
What Is Hacking and How Did It Start?

You've heard of computer hackers, but what do they actually do? How can you define "hacking"? Here's what you need to know.

By 
Mom Using Tablet with Children 1
Internet Safety: 50+ Tips to Keep Your Kids Safe Online

Children are prime targets for online predators and cyberbullies. These handy tips can teach parents how to keep them safe online.

By 
enable whatsapp encryption 1
How to Enable Two-Step Verification on WhatsApp

WhatsApp offers two-step verification to all of its 2 billion users worldwide. And we encourage everyone to enable this crucial security feature ASAP.

By 
39 40 41 42 43
Page 41 / 75