MUO

Online Security

Page 61

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
websites-store-password 1
The 5 Best Online Password Generators for Strong Random Passwords

Looking for a way to quickly create an unbreakable password? Try one of these online password generators.

By 
phone-scam-signs 1
7 Telltale Signs You're on the Phone With a Scammer

Thieves use all sorts of phone scams to rip you off. Here are some telltale signs that you're talking to a scammer on the phone.

By 
credential-dumping 1
What Is Credential Dumping? Protect Yourself With These 4 Tips

Hackers have a new weapon: credential dumping. What is it? How can you avoid your accounts being compromised?

By 
kids-minecraft 1
Is Minecraft Safe for Kids? Minecraft Age Rating Explained for Parents

Worried Minecraft might not be safe for kids? Concerned about Minecraft's age rating? Learn about child safety on Minecraft.

By 
download-ads 1
How to Avoid Fake Ads Disguised as Fake Download Links

Fake ads disguised as download links are all over the web. Here are some vital tips to avoid ads designed to trick you.

By 
hackers-threat-medical-iot 1
Hackers Threaten Medical IoT Devices: Here's How to Keep Them Safe

Medical IoT devices can improve quality of life and treat patients remotely, but medical IoT devices are at risk from hackers.

By 
whatsapp-privacy 1
Everything You Need to Know About Your WhatsApp Privacy Settings

As with all communication tools, privacy is of utmost importance. Here's how to protect your privacy when using WhatsApp.

By 
cloudflare-dns-protect-privacy 1
How Cloudflare DNS Helps Solve 4 Big DNS Privacy Risks

Cloudflare has released a free new security tool. Here's how Cloudflare DNS helps improves security, privacy, and even speed.

By 
 1
Google Makes It Easier to Report Suspicious Sites

Google has launched a new Chrome extension called Suspicious Site Reporter that makes it easier to report suspicious sites.

By 
dark-web-myths 1
6 Dark Web Myths Debunked: The Truths Behind Them

You've heard about the Dark Web, but is it really as scary or illegal as you've been lead to think?

By 
password-managers-work 1
How Do Password Managers Work? 3 Methods Explained

How do password managers work and which one should you choose? It's time to secure your online accounts with a password manager.

By 
extra-tor-security 1
Darknet Market Takedowns Show Why Extra Tor Security Is Needed

Thinking about exploring the dark web using Tor? Here's how to stay safe on the dark underbelly of the internet.

By 
 1
How to Browse Facebook Over Tor in 5 Steps

Want to stay secure when using Facebook? The social network has launched a .onion address! Here's how to use Facebook on Tor.

By 
linux-password-managers 1
The 8 Best Linux Password Managers to Stay Secure

Need a secure password manager for Linux? These apps are easy to use and keep your online passwords safe.

By 
code-signed-malware 1
What Is Code-Signed Malware and How Do You Avoid It?

Code-signed malware is a new threat for computer users. How can you protect your PC and data from code-signed malware?

By 
adult-site-scam 1
Adult Website Email Scam: Don't Give Bitcoin to Thieves

Received an email from someone claiming to have access to your account? Here's a breakdown of the adult website email scam.

By 
online-bank-safety 1
10 Tips to Keep Your Online Bank Account Secure

Switching to online banking comes with some security risks. These tips explain how to keep your online bank account safe.

By 
dont-share-wifi-password 1
Why You Should Never Share Your Wi-Fi Password

Thinking about sharing your Wi-Fi password? Already sharing it? Here's why you should never share your Wi-Fi connection.

By 
companies-dont-care-security 1
Behind the Mask: 4 Companies That Don't Really Care About Your Security

Nearly every company says they care about your privacy and security. Here are some examples that show otherwise.

By 
whaling-cyberattack 1
Worse Than Phishing: What Is a Whaling Cyberattack?

While phishing attacks target individuals, whaling cyberattacks target businesses and organizations. Here's what to look out for.

By 
59 60 61 62 63
Page 61 / 75