MUO

Online Security

Page 52

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Video Chat 1
What Do These Popular Video Messaging Services Know About You?

What information does Skype, Zoom, Google Hangouts, Microsoft Teams, and WebEx store about you?

By 
 1
533 Million Facebook Records Were Just Leaked Online for Free

The actual leak first took place last year, but someone just put all the records up online at no cost.

By 
hacked 1
What Does Indicators of Compromise Mean? The Best Tools to Help Monitor Them

Indicators of Compromise provide clues and evidence regarding data breaches. Learn the importance of monitoring them and four tools that can help.

By 
Employees Using Personal Devices at Work 1
Using Your Own Device For Work? Here's How to Secure Business and Private Data

This is how you can create strong Bring Your Own Device (BYOD) policies at work, to keep information secure.

By 
telegram-message-passlock 1
How To Protect Your Telegram Messages With a Passcode

Here's how you can add a passcode to protect and safeguard your Telegram messages from prying eyes and unauthorized access.

By 
mario computer 1
Does My Game Console Have a Virus?

If your console if behaving oddly you might suspect it has a virus. But can game consoles get viruses - and how would you know?

By 
microsoft 1
Is Microsoft 365 Actually a Security Risk?

If you use Microsoft 365, you might be wondering how it secures your data in the cloud. So is it a threat to your security?

By 
gray-scale image of hanging keys 1
KeePass vs. LastPass vs. 1Password: Which Password Manager Should You Choose?

Check out this password manager comparison to find out which is the best app to store your login credentials.

By 
programming device spying 1
What Is Malware and How Does It Work?

Malware is running rampant. Learn how it works and how you can prevent being infected.

By 
Purple fox 1
What Is Purple Fox Malware and How Can It Spread To Windows?

Learn everything about the re-purposed Purple Fox malware and how to protect yourself from this growing threat.

By 
brute-force-attack 1
What Are Brute-Force Attacks? How to Protect Yourself

What is a brute-force attack? Here's how this common attack works and how to keep yourself safe from it.

By 
green screen on laptop 1
Can You Really Go Passwordless to Secure Your Online Accounts?

Many services point out the benefits of passwordless logins, but are they really more secure? Are they even realistic?

By 
feature image for spyware 1
What Is Spyware and How Does It Work?

Spyware records your online activities without permission. Learn how it works and how you can stay safe.

By 
Laptop with login screen 1
How Secure Is a Password Manager, and Are They Safe?

Password managers like LastPass are convenient and mostly free to use. But are they safe? How do they keep you secure?

By 
Three locks and a chain going through them 1
Privacy vs. Anonymity vs. Security: Why They Don't All Mean the Same Thing

What's the difference between security, anonymity, and privacy? And when should you prioritize one over another?

By 
 1
Why That Email About Your Apple ID Being Locked Is a Scam

Here are the most common signs that you're dealing with a phishing email that will steal your Apple ID and password.

By 
Masked face with hoodie representing a hacker 1
Learn How Hackers Can Hack Your Facebook Account and How to Fix It

Here's how cybercriminals hack into a Facebook account, and how to protect yourself from attackers.

By 
passwords written in a diary 1
The 20 Top Passwords You Should Never Use: Is Yours on the List?

If one of your passwords is on this list of easy-to-guess combinations, you need to change it right now!

By 
clickbaits-internet-ads 1
We Followed Clickbait Internet Ads: Here's What We Found

We wanted to find out more about scammy clickbaity online ads by doing what no one means to do: clicking on them.

By 
 1
You Can Now Use Multiple Physical Keys to Log In to Twitter

Physical keys are more secure than SMS codes or authenticator apps when it comes to protecting your Twitter account.

By 
50 51 52 53 54
Page 52 / 75