MUO

Online Security

Page 5

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
grayscale image of vpn active on smartphone 1
6 Signs of a Scam VPN

VPNs are rightly popular, and that means scammers have set up malicious apps posing as genuine VPNs too. Here's what to look out for.

By 
People silhouettes divided into groups 1
Centralized vs. Decentralized Identity Management Models: Which Is Better for Security?

Identity management models determine where data is stored and shared, so which is better: a centralized or decentralized model type?

By 
Laptop screen with 18+ sign 1
What Is Pornware? Here's Everything You Need to Know

You don't have to visit adult NSFW websites to be targeted by pornware. In fact, it can affect everyone. So what can you do about pornware?

By 
A person using a laptop with special effects in the foreground 1
6 Reasons Why Supply Chain Attacks Are on the Rise

Such attacks are becoming a major headache for cybersecurity teams, and countering them is a massive challenge.

By 
man-typing-system 1
What Is Extended Detection and Response (XDR) and Why Do You Need It?

With this framework, you can gain the foresight to identify vulnerabilities that you might otherwise overlook.

By 
Women working on a laptop with the American Emergency Fund website open. 1
American Emergency Fund Loan: Separating Fact from Fiction

The American Emergency Fund isn't technically a scam, but it might as well be.

By 
Person using chatGPT on his laptop 1
Can Cybercriminals Use ChatGPT to Hack Your Bank or PC?

ChatGPT can help people do a great number of things, including get access to your most sensitive information.

By 
An image of a person using a smartphone with the Gmail logo overlay in the middle 1
How Gmail's Blue Checkmarks Could Protect You From Phishing Emails

Everyone knows phishing is a major security risk. Google's blue checkmark initiative aims to tackle this problem, but it's not fool-proof.

By 
Person Holding a Silver Keychain with a Key 1
How Passkeys Can Help Keep Your Google Account Safe

Passkeys are a secure alternative that's bringing us one step closer to a passwordless future. Here’s everything you need to know about passkeys.

By 
Laptop on a desk 1
What Are Eavesdropping Attacks and How Can You Prevent Them?

Hackers might be secretly stealing your data. Learn what eavesdropping is and take the suggested measures to protect yourself.

By 
digital graphic of paypal logo on rectangular button in front of starry background 1
Is PayPal Safe to Use?

It seems that everyone uses PayPal, but is it actually safe? How does PayPal secure your data? What protections does it offer?

By 
2 women working on a laptop 1
What Is Cyber Risk Appetite and Why Is It Important?

Here's why you need to assess the threats your network faces, in order to properly manage your responses to cyberattacks.

By 
whonix os logo staying anonymous 1
How to Browse the Internet Anonymously Using Whonix

Whonix makes it easier to stay anonymous online. Here's a guide on why and how you can use Whonix.

By 
manthan-gajjar-8IyF3vUgFGs-unspl 1
What Is a Smurf Attack and How Can You Prevent It?

First carried out in 1998, a smurf attack can result in serious disruption to a website or service. Here's what you need to know.

By 
A black and white optical illusion that looks like the Sun. 1
What Are Adversarial Attacks in Machine Learning and How Can We Fight Them?

You might've heard of adversarial attacks in relation to artificial intelligence and machine learning, but what are they? What are their aims?

By 
An elderly woman's hands clasped in her lap. 1
How to Help Protect Seniors From Scammers

Older adults who didn't grow up with the internet are more likely to fall victim to computer-related scams. Here are some tips to reduce those odds.

By 
ChatGPT logo on dark green background  1
Is ChatGPT a Big Privacy Risk?

What does ChatGPT know about you? Even if you've never used the artificial intelligence service, it may have more of your data than you realize.

By 
Computer code in focus through lens 1
How Long Does It Take AI to Crack Your Password? You’d Be Surprised

An AI model called PassGAN can crack short passwords in seconds. But do you need to be wary?

By 
digital graphic of crypto terms and hooded man with code background 1
What Is a Crypto Airdrop Scam? 4 Ways to Spot and Avoid Cryptocurrency Scams

You can get free cryptocurrency tokens through airdrops, but be careful: cybercriminals have jumped on this publicity idea to scam victims.

By 
ChatGPT logo on purple background  1
Does ChatGPT Have Any Security Issues?

Many of us use ChatGPT frivolously, but it comes with serious security and privacy issues that you need to know about.

By 
3 4 5 6 7
Page 5 / 75