MUO

Online Security

Page 47

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
 1
What Happened When We Responded to a Phishing Email?

We responded to a phishing email, so you don't have to. Here's what happened.

By 
avg internet security on a laptop 1
Protect Your Computer With 50% Off AVG Internet Security

Keeping your computer and the data stored on it is important. Do it affordably with AVG's summer discount.

By 
hacker feature image 1
The 6 Types of Hackers You Should Be Aware Of

To prevent a cybersecurity attack, you need to be aware of the types of hackers and attacks they use to compromise your data.

By 
 1
4 Ways That Chrome 91 Is Improving Browsing Security

Browsing security is an essential feature of any browser. Here's four ways that Chrome 91 is improving browsing security.

By 
 1
How Do Websites Keep Your Passwords Secure?

With so many online security breaches these days, you might be concerned about how websites store your passwords.

By 
 1
Is Your Network Secure? 5 Ways to Check Your Internet Connection

Keeping your internet connection secure is vital for maximizing your online experience. Learn how to check it for safety.

By 
malware 1
When Malware Has Morals: The Case of “Vigilante” Attacks

Malware isn't always bad: sometimes, it can be used to dissuade people from illegally pirating content.

By 
 1
Firewall vs. Antivirus: What's the Difference and Do You Need Both?

Yes, antivirus software is different to a firewall, so what does each one do? And can you stay secure without one or both?

By 
Computer Software on Laptop Warning Open Source Security 1
Just How Secure Is Open-Source Software?

Here are the pros and cons of using open-source software, compared to closed-source: so how safe is open-source?

By 
warehouse 1
Dropshipping Sites: What Are They and Are They a Scam?

You've probably already seen ads from dropshipping shops, so what are they, and can you safely buy from them?

By 
Photo of money 1
Why You Shouldn’t Trust Jobs in Comments Sections

When beginning as an online freelancer or remote worker, you need to make sure you don't get scammed.

By 
Dashlane vs lastpass 1
Dashlane vs. LastPass: Is It Time to Switch Password Managers?

Let's compare design, encryption, platform, browser extension support, security, storage features, and more.

By 
Laptop with code on the screen 1
DarkSide Ransomware: Who Was Behind the Colonial Pipeline Attack?

DarkSide ransomware attacks companies but claims to have a code of conduct. Who are the perpetrators and how do they operate?

By 
firmware-malware 1
What Is TrickBot Malware and How Can You Protect Yourself?

One of the most persistent botnets of all time, the TrickBot malware has evolved over time. Here's how to protect yourself.

By 
Green code on black background 1
What Is Metadata and What Can It Reveal About You?

Images, audio files, documents: all contain metadata, and if enough is collected, it can reveal a lot about you.

By 
A lock and Wi-Fi signal 1
How Hackers Steal Your Wi-Fi Password and How to Stop It

Hackers know how to hack your Wi-Fi password. Here's why and how you can stop them cracking your password.

By 
hacker code screen 1
10 Ways to Protect Against Doxxing

Doxxing involves cybercriminals posting personal information online. Here's how to defend yourself from being doxxed.

By 
angler phishing attempt 1
What Is Angler Phishing and How Can You Avoid Falling Victim?

Been contacted on social media by a company rep? Don't immediately trust them: it could be a angler phishing scam.

By 
worried online shopping 1
Should You Be Worried About Amazon Sidewalk's Security?

Can Amazon Sidewalk be hacked? What can you do if you're worried it's a threat to your privacy? Here's what you need to know.

By 
 1
7 Tips for Keeping Your Digital Photos Secure on Vacation

Going on vacation? Whether using a smartphone or digital camera, learn how to store your photos securely.

By 
45 46 47 48 49
Page 47 / 75