MUO

Online Security

Page 55

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Do not enter sign in the desert 1
8 Smart Home Mistakes to Avoid (and How to Fix Them)

We all make mistakes from time to time. So here are the smart home mistakes you should try to avoid making.

By 
VPN at home 1
VPN
Who Can Track Your Data When Using a VPN?

VPNs protect your privacy, but who can still access your data? And what information can they actually see?

By 
A caught fish 1
What To Do After Falling for a Phishing Attack

You've fallen for a phishing scam. What should you do now? How can you prevent further damage?

By 
Illustration of data entering folders 1
Want to Keep Personal Data Secure? Here's How to Encrypt a File

Encrypting folders keeps your data safe from hackers. Here's how to password-protect files on Windows and Mac.

By 
A person using a tablet to connect online 1
Stay Safe Online: What You Need To Know About Digital Distancing

Here's how digital distancing can protect you when you're working remotely at home or studying online.

By 
Person using two laptops 1
What Is Penetration Testing and How Does It Improve Network Security?

Looking for a way to test your security systems? Here's what you need to know about network penetration testing.

By 
Man wearing a skull mask using a computer 1
What's the Difference Between Black-Hat and White-Hat Hackers?

What are black-hat and white-hat hackers? What are gray-hat hackers? And how can you protect yourself from them?

By 
 1
What Is a Man-in-the-Middle Attack?

A man-in-the-middle attack is one of the oldest scams going. But how does it work on the internet and how can you spot it?

By 
Someone with a poor sense of password security 1
Microsoft Wants You to Ditch Your Passwords in 2021

The software giant believes that biometrics is the future.

By 
dark web interview feature 1
How Does the Dark Web Affect Your Security?

The dark web is full of dangerous stuff, but how does it affect your security directly?

By 
 1
Understanding Malware: 10 Common Types You Should Know About

Learn about the common types of malware and their differences, so you can understand how viruses, trojans, and other malware work.

By 
 1
What Is a Credential Stuffing Attack?

Here's everything you need to know about this dangerous cyberattack and what you can do to protect yourself.

By 
lenovo-security-threat 1
Why You Should Avoid Lenovo PCs: 7 Security Risks to Consider

Think your Lenovo laptop is safe and secure? Think again! Various security risks and vulnerabilities have plagued Lenovo PCs.

By 
bank-account-been-hacked 1
Has Your Bank Account Been Hacked? 5 Things to Check

Your savings could be at risk. Here's how to spot if your bank account has been hacked and what to do next if it was.

By 
Steam logo on a code background 1
Valve Addresses Steam Security Vulnerabilities

Valve patches four potential weaknesses before hackers could locate and exploit them.

By 
 1
How to Inspect Suspicious Links Using Your Browser's Inbuilt Tools

If you encounter a suspicious link, check it out using the tools available in your browser.

By 
Lokibot malware info stealer 1
What is LokiBot Malware and How Can You Protect Yourself?

This malware targets Windows and Android to steal private data and even hold you to ransom. Here's what you need to know.

By 
Sign that says free wifi inside 1
How Easy Is It to Hack a Smartphone on an Open Network?

Do you use public Wi-Fi? You're a big target for hackers, so here's how to protect yourself.

By 
What's a CSRF attack and how can you prevent it-Featured 1
What Are CSRF Attacks and How Can You Prevent Them?

To stop you losing cash and credentials in CSRF attacks, both developers and users have a role to play.

By 
Hands holding tablet with login screen 1
How to Use LessPass to Manage Your Passwords

LessPass is a secure password manager because it doesn't save your password. Here's what you need to know.

By 
53 54 55 56 57
Page 55 / 75