MUO

Online Security

Page 48

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
breaking-firewall 1
6 Ways to Unblock Websites From Behind a Firewall

Need to know how to unblock websites? Here are several methods you can use to allow access to a site from behind a firewall.

By 
Photo of VPN network showing on computer screen 1
What Is a No-Log VPN?

With so many VPNs on the market these days, knowing which to choose is hard. Here's why no-log VPNs are worth considering.

By 
cybersecurity course feature 1
The Top 4 Cybersecurity Trends to Watch Out for in 2021 and Beyond

Here are the cyberattacks you need to keep an eye on in 2021, and how you can avoid falling victim to them.

By 
A malware warning 1
Can Malware Trick Your Antivirus to Bypass Ransomware Protection?

Antivirus software doesn't always stop ransomware. Here's how cybercriminals bypass it and what you can do about it.

By 
Gift cards 1
Why Do Scammers Always Ask for Gift Cards?

Fraudsters often ask their victims for payment via gift cards—but why? Why don't they simply ask for money instead?

By 
Spider web, hand and prying eyes 1
What Is Dark Web Monitoring and Do You Need It?

Many services including password managers offer dark web monitoring. So how does it work? And is it worth using?

By 
Ransomware-developer 1
Why Are Malware Developers Attacking Big Businesses?

Several large companies have been hit by ransomware, so why are they such a big target? What are the cybercriminals' aims?

By 
Ransomware 1
What Is Babuk Locker? The Ransomware Gang You Should Know About

In January 2021, a new ransomware variant attacked enterprise networks, overseen by a ransomware gang named Babuk Locker.

By 
Browsers 1
Are Browser Extensions Really Safe?

While they provide a customized functionality to our browsing experience, are browser extensions safe to use?

By 
Security Sign 1
A Guide to the Security Settings in Microsoft Edge

Here are four simple ways you can reconfigure the Microsoft Edge browser to make your online activities safer.

By 
 1
10 Ways to Protect Against Social Media Threats on Twitter

Stay safe while using Twitter by tweaking your security and privacy settings on the social media platform.

By 
Wi-Fi network 1
What Are Wi-Fi Frag Attacks and How Can You Protect Against Them?

Short for "fragmentation" and "aggregation", Frag attacks allow hackers to bypass firewalls to inject code into Wi-Fi traffic.

By 
cyberghost vpn logo 1
Get a Massive 83% Discount on Privacy Protection With CyberGhost VPN

Installing a VPN is one of the best things you can do for your privacy. Check out this amazing deal with CyberGhost VPN.

By 
furby in grass toy 1
Are Smart Toys Safe For Your Kids to Play With?

Before your children play with smart devices, are there any security risks you should know about? Are they actually safe?

By 
Phone with a Chrome logo. 1
6 Reasons You Shouldn't Use Your Web Browser's Password Manager

Google Chrome, Edge, and all the other major browsers have password manager functions, but should you really use them?

By 
Fingers typing on laptop keyboard 1
What Are Keyloggers? Five Easy Ways to Protect Against Them

A grave threat to your sensitive information, keyloggers can record every keystroke on a device.

By 
Illustration of data entering folders 1
Data in Transit vs Data At Rest: Where Is Your Data Safest?

Learn the difference between data in transit, in use, and at rest, and which has the greatest vulnerabilities.

By 
crown 1
Nigerian Prince Scams: What Are They and Why Aren't You Rich?

Got an email offering you thousands or millions of dollars as a reward for your help? Don't fall for this phishing scam.

By 
human hacking 1
Hacking Humans: 5 Ways You Can Be Exploited on Social Media

Think before you share too much information on social media: here's how cybercriminals can influence your life online.

By 
blockchain network 1
Is It Possible to Hack the Blockchain?

A ledger of digital transactions, the blockchain makes it difficult to alter digital assets. But can it be hacked?

By 
46 47 48 49 50
Page 48 / 75