MUO

Online Security

Page 42

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
woman distressed on computer 1
How to Identify and Report Security Incidents

How do you keep an eye on the cybersecurity of a company? Here's how to recognize a potential security or privacy breach and what to do.

By 
Woman with Laptop 1
5 Ways to Identify Employee Data Theft

When a company holds a lot of sensitive info, it can feel overwhelming keeping track of who is accessing it. Here's how to monitor for data theft.

By 
white-hat-security 1
What Is a White Hat Hacker?

A white hat hacker is an ethical hacker who uses their skills to protect against cyberattacks. Here's what you need to know.

By 
Digital illustration of trojan horse malware. 1
Here's What You Need to Know About the Dridex Trojan Horse

It's been described as the most prevalent malware in the world. But what is Dridex? And how do you protect yourself?

By 
antivirus 1
6 Reasons to Pay for an Antivirus App

You shouldn't solely rely on Windows Defender and Apple's XProtect to secure your devices. Here's why you should consider premium security suites.

By 
Computer System 1
6 Frontend Security Risks and How to Prevent Them

Backend security is vital, but you still need frontend defenses. Here's how cybercriminals take advantage of any vulnerabilities, and what to do.

By 
No 1
How to Keep Advertisers From Stealing Your Data

Your data is worth more than you might think. Here's how services collect your personal information and what you can do to fight against it.

By 
uninstall-chrome-extensions 1
6 Shady Google Chrome Extensions You Should Uninstall ASAP

Here are dangerous Chrome extensions that you should uninstall, plus some tips for avoiding bad extensions in the future.

By 
security risk 1
Update Your HP Omen Gaming Software to Avoid Getting Hacked

This security flaw found in the HP Omen Gaming Hub could put millions of gamers at risk. Here's what you need to know.

By 
Data Storage 1
4 Ways to Decentralize Your Business Data 

It's not always a good idea to keep business data all in one place. Here's why you need to decentralize information, and how to do so.

By 
ssl-encryption 1
SSL
What Is an SSL Certificate, and Do You Need One?

You'll notice HTTPS in the URL of most sites. That indicates that the page uses an SSL certificate. But what does that mean? Which sites need one?

By 
hidden picture 1
Is Incognito Mode Completely Secure?

Do you use Google Chrome's in-private browsing feature, incognito mode? Here's what it does, and (just as importantly) doesn't, do.

By 
photo of anonymous person taking a selfie 1
How Thieves Are Borrowing Phones and Emptying Bank Accounts

Mobile banking is usually secure—unless you hand over your phone to a thief. Here's why you need to be careful.

By 
quantum safe vpn 1
NordVPN vs. IPVanish: Which Is the Best VPN For You?

Looking for the right VPN for you? We compare IPVanish and NordVPNs' server locations, pricing, geo-restrictions, and more.

By 
expressvpn kape 1
ExpressVPN Acquired by Kape Technologies: How Does It Affect You?

ExpressVPN, one of the most popular VPN services, has been acquired by Kape Technologies, so how does this affect users?

By 
destructive malware attack in Internet History 1
The 8 Most Notorious Malware Attacks of All Time

Knowledge is your first line of defense, so here are some of the worst viruses you need to know about, including Trojans, worms, and ransomware.

By 
VPN vs. ZTNA 1
What Is a Zero Trust Network and How Does It Protect Your Data?

Looking to keep your business secure from cybercriminals? VPNs are great, but they might not be as effective as ZTNs with Software-Defined Perimeters.

By 
Photo of a wire plugged into an internet router 1
DNS
7 DNS Services to Protect Your Family and Network with Minimum Setup

These DNS services will ensure that your family is kept away from adult content and dangerous sites.

By 
Photo of people working on insurance 1
What Is Cyber Insurance and Do I Need It?

As more people look to improve their online security, one area often looked at is cyber insurance. But what is it, and is it worth buying?

By 
Steam Fake Tournament Friend Scam Featured 1
Beware This Steam Tournament Scam From Your "Friend"

A common Steam scam comes from a compromised friend's account and asks you to help out with a tournament. Here's how it works, and how to stay safe.

By 
40 41 42 43 44
Page 42 / 75