MUO

Online Security

Page 50

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Playstation Player Fifa 1
PSN Account Hacked? Here's What to Do Next

Think your PlayStation Network has been hacked? Here's how to recover your PSN account and keep it secure.

By 
 1
What Is the Best Password Manager for Your Device?

What is the best password manager app for your computer, smartphone, or tablet? Let's find out...

By 
computer worm 1
What Is a Worm and How Does It Get on Your Computer?

Peskier than a computer virus, a worm can self-replicate and cause serious damage to a vulnerable machine.

By 
Hand scraping with a legal stand on a table 1
Is Web Scraping Illegal?

Web scraping is the collection of data from websites, which can include personal information. So is screen scraping legal?

By 
social media 1
Is Someone Else Impersonating You on Social Media?

Someone is using your identity on social networks. So what do impersonators get out of this? And what can you do about it?

By 
 1
Does HTTPS Protect Data in Transit?

What makes HTTPS, the secure version of the internet protocol, so safe? Does it really look after your personal info?

By 
a padlock on a smartphone 1
What Is Avast Secure Browser? Everything You Need to Know

Avast Secure Browser lets you safely surf the web. But what exactly is it, and how do you set it up?

By 
 1
How to Hide Your Real Email Address

Do you want to keep your email address private? Many services require an address, so can you really hide your email?

By 
lock and binary code 1
How to Send Encrypted Email With 5 Popular Mail Services

Not all email services are created equal — read on to find out which popular email services support encryption to keep your mail safe and secure.

By 
Person holding an iPhone with the social media folder open 1
Report: Facebook and Google Should Do More to Remove Scam Ads

A recent study suggests that Facebook and Google aren't doing enough to tackle bad ads on their respective platforms.

By 
ngi-biometrics 1
4 Examples of Passwordless Logins You're Using Right Now

You might be cautious about using passwordless logins. But actually, you could already be using them without knowing it.

By 
woman on computer 1
Why Should You Avoid Illegal Streaming Sites?

Illegal streaming services are tempting, but here's why you should avoid using these sites—or risk your security!

By 
cybercrime as a service for rent ransomware 1
What Is Cybercrime as a Service?

If cybercriminals want to launch an attack, they no longer need the skills and software to do so. Here's why.

By 
person paying online 1
Don’t Pay by Bank Transfer: 5 Secure Alternative Methods

Paying by bank transfer could mean you get scammed out of your money. So what secure methods can you pay by instead?

By 
 1
5 Reasons Why You Shouldn't Use Zoom Anymore

Zoom faces backlash due to privacy and security concerns. Here's why you should think twice before using it.

By 
Netflix 2FA security 1
Stop Sharing Passwords: Why Netflix Might Be More Secure Than Ever

Netflix is testing a 2FA feature that will help crack down password sharing. Here's why that's actually good for subscribers.

By 
DDoS site down attack error server 1
Your Website Has Been DDoSed - But What Does DDoS Mean?

What is a DDoS attack and what does it mean to get DDosed?

By 
USB Stealing Data 1
5 Ways to Keep Employees From Stealing Company Data When They Leave

How do you make sure employees who have resigned aren't taking your company data with them?

By 
Cloud services 1
Is Dropbox Secure Enough for Your Private Files?

Using Dropbox for backing up and syncing your vital, personal, and sensitive data? You might want to reconsider...

By 
Stealing an email 1
Your Email Address Has Been Leaked: So What?

You might not care if your email address has been part of a data breach, but here's how it can affect your security.

By 
48 49 50 51 52
Page 50 / 75