MUO

Online Security

Page 43

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
students at university 1
Why Is Ransomware Such a Big Threat to Universities?

Ransomware poses a significant threat to universities. But why is this the case, and how can you protect yourself?

By 
Computer Network 1
What Is Shadow IT and How Can You Manage Security Threats?

Unmonitored tools can be both good and bad for a workplace. Here's what shadow IT is and how you can manage the potential threats to your business.

By 
Man sitting in front of a computer screen in the dark 1
What Is PhotoDNA and How Does It Work?

How do companies monitor for child abuse? Firms like Facebook use PhotoDNA to maintain user privacy while scanning for abusive images and videos.

By 
Digital illustration of the Guy Fawkes mask. 1
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

By 
remote desktop cant find computer error 1
At Home and in the Office? How to Work Securely in a Hybrid Environment

Working in the office and off-site, like at home? Here's how employees and employers can maintain strong cybersecurity wherever they are.

By 
quantum safe vpn 1
Verizon's Quantum-Safe VPN: What You Need to Know

How do you maintain encryption if cybercriminals use quantum computing to decrypt data? Verizon might just have an answer...

By 
programmers and computers vector 1
6 Hobbies You Should Have if You’re Interested in Cybersecurity

Looking for a job in cybersecurity? Here are some great hobbies to build your skill set and prove you have what it takes.

By 
A USB stick is plugged into a laptop. 1
Hackers Bribe Employees to Deploy Ransomware on Company Computers

Hackers are finding new ways to infiltrate businesses: using insiders to cripple companies using ransomware.

By 
money on fire in hand 1
GoFundMe Scams: How to Identify Fake Fundraisers

Not everyone using fundraising sites like GoFundMe are as well-intentioned as you might expect. Here are some easy ways to spot a fundraising scam.

By 
Network 1
What Is the NIST Cybersecurity Framework?

When thinking about online security, the NIST cybersecurity framework is one of the most popular implementation choices. But what is it?

By 
Ransomware offering 1
Has Ragnarok Ransomware Called It Quits?

A ransomware gang operating since 2019, Ragnarok is making the news again. But this time, maybe it's for the right reasons...?

By 
ProtonVPN logo 1
How to Enable WireGuard on ProtonVPN

You can use WireGuard on ProtonVPN on Android, iOS, and Windows. Here's how to enable it on your device.

By 
hive ransomware warning 1
Here’s Why the FBI Issued a Warning for Hive Ransomware

The FBI issued a warning about a particularly nasty strain of ransomware. Here's why you need to be especially wary of Hive ransomware.

By 
person typing on laptop in the dark 1
Dark Web vs. Deep Web: What's the Difference?

The dark web and deep web are often mistaken for being one and the same. But that's not the case, so what's the difference?

By 
getting targeted by ransomware 1
5 Surefire Things That’ll Get You Targeted by Ransomware

Ransomware is a serious threat to your online security, and doing these five things will increase the risk of an attack.

By 
google-drive-restrict 1
How to Restrict Sharing Options in Google Drive

Being able to control your file sharing options in Google Drive is an important part of security for your files. Here's how to do just that.

By 
Image emphasizing cybersecurity. 1
What Is Malware-as-a-Service?

Hackers can employ Malware-as-a-Service to make money and gain personal information. So what is MaaS? How can you protect yourself?

By 
ryuk ransomware 1
What Is Ryuk Ransomware?

Ryuk is unlike numerous ransomware iterations. Here's what you need to know about the malware that only targets critical functions.

By 
a drivers license 1
Hackers Are Now Targeting Expired Driving Licenses: Here's Why

Get an email from the DMV saying your driving license has expired? It's a scam. Here's why expired or expiring licenses are a target for scammers.

By 
featured image for Package Hunter 1
How GitLab's Package Hunter Prevents Supply Chain Attacks

GitLab's latest tool can find malicious code in open-source projects. Here's how you can use Package Hunter to keep your CI/CD pipeline safe.

By 
41 42 43 44 45
Page 43 / 75