MUO

Online Security

Page 53

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
laptop with a mask on it. 1
Security Challenges During the COVID-19 Pandemic and How to Protect Yourself

Working remotely during the Coronavirus pandemic? Learn how to protect yourself from the increasing security risks.

By 
Magnifying Glass Over Binary Code 1
How Host and Network-Based Intrusion Detection Systems Work

Host vs. Network-Based: How do these IDS protect your servers from cyberattacks, and which is best?

By 
golang malware ransomware cryptominer 1
What You Need To Know About Golang-Based Malware

This emerging threat can target multiple platforms and remain undetected.

By 
a logical network 1
What Is a DMZ and How Do You Configure One on Your Network?

Want to add an additional layer of security to your home or office network? Learn about the DMZ and how to configure it.

By 
 1
Don't Be Fooled by These Advanced Phishing Techniques

Anyone can be fooled by a phishing email or website vulnerability. Watch out for these advanced phishing tricks.

By 
 1
What Is G2A, and Is It Safe to Buy From?

The online service offers cut-price games, hardware, and codes. But why are they so cheap? Can you really trust it?

By 
fake-profile-dating 1
How To Spot a Fake Profile on Online Dating Apps

Here's what you need to watch out for if you've joined Tinder, Bumble, or another online dating service.

By 
vpn-myths 1
6 Common VPN Myths and Why You Shouldn't Believe Them

Don't believe these myths and misconceptions about VPNs. Here's the truth so you know what to expect when using a VPN service.

By 
Wish 1
What Is Wish.com? And Is It Safe to Buy From?

Wish offers low prices, but can you really trust it? Here's what you need to know if you think it may be a scam.

By 
 1
Adobe Flash Might Be Dead, But It Can Still Be a Security Threat

Adobe stopped supporting Flash on December 31, 2020, but dead software can still be a threat to your online security.

By 
security phone vulnerability feature 1
How Many Security Vulnerabilities Are There and How Are They Assessed?

Every year, thousands of vulnerabilities are made public. But how many of those are actually exploited?

By 
 1
VPN
How to Set Up WireGuard on Windows

WireGuard is a VPN designed for everyone to use. So how do you set it up on your Windows PC or laptop?

By 
Start Using Password Manager Featured 1
How to Start Using a Password Manager

Want to use a password manager but not sure where to start? Here's a complete setup guide on using a password manager.

By 
Ransomware 1
What Is Ransomware and How Can You Remove It?

You've heard the stories, but what is ransomware? How does it work? Does it really steal your data - and how can you stop it?

By 
LinkedIn app 1
Secure Your LinkedIn Account in Just 7 Steps

As a social network, your LinkedIn account is at risk from hacks and scams. Learn how to secure your LinkedIn account today.

By 
Computer security 1
5 Easy Ways to Secure Your Computer in Less Than 5 Minutes

Short on time? Everyone can be a target of malware, viruses, and hackers, so protect your device with these quick tips.

By 
share-passwords 1
How to Safely Share Passwords With Friends and Family

You should never share your passwords. But if you must, here's how to share your passwords while keeping your accounts as secure as possible.

By 
An opened email mailbox. 1
What is MTA-STS and How Does It Protect Your Emails?

Want ultra-secure emails? Learn about the new internet standard called the MTA-STS.

By 
network-security 1
Is Your Network Secure? How to Analyze Network Traffic With Wireshark

Want to learn how to use Wireshark? This guide introduces the core features of Wireshark with real-world examples.

By 
Bird Eye View of Employees Working 1
How to Keep Your Personal Data Safe From Employers

Your employers are allowed to track you and access your data. So how can you hide your personal browsing history?

By 
51 52 53 54 55
Page 53 / 75