MUO

Online Security

Page 69

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
onenote-compared 1
How to Keep Your OneNote Notes Secret and Safe

If you use OneNote for highly sensitive documents, you need to take this precaution. You don't want your details falling into the wrong hands!

By 
iot-vulnerabilities 1
Is Your Smart Home at Risk From Internet of Things Vulnerabilities?

Is the Internet of Things safe? You would hope so, but a recent study has highlighted that security concerns raised several years ago have yet to be addressed. You smart home could be at risk.

By 
 1
Hideez Digital Key Review: Password Storage On a Keychain

The Hideez Digital Key sits on your keychain, generates and stores passwords, alerts you if your keys go missing, and alerts you if your phone is stolen. But does it promise too much?

By 
wifi-pineapple 1
What Is a Wi-Fi Pineapple and Can It Compromise Your Security?

The Wi-Fi Pineapple is a device that closely resembles a Wi-Fi access point. Designed penetration testing, it can be re-purposed to perform malicious man-in-the-middle attacks. Are you at risk?

By 
 1
Change Your Router Password Before It Gets Hacked

If you've never changed the password for your wireless router, your network is at risk. Here's how to log into your router's settings and set a new password.

By 
 1
Google Teaches Your Kids How to Stay Safe Online

Google has launched a new initiative called Be Internet Awesome. It comprises of five key lessons which should help children everywhere navigate the online world.

By 
curly-linux 1
How to Peek at Shortened URLs Without Clicking on Them

Shortened URLs are convenient for social media, but can be extremely risky because you can't see where they lead. Here are a few ways to peek without clicking!

By 
 1
560 Million Old Passwords Have Leaked Online

It's probably time to change your passwords again. Because a huge database of 560 million login credentials has been found online, waiting to be discovered by ne'er-do-wells.

By 
 1
Everything You Need to Know About the Google Docs Phishing Scam

Concerned about the phishing attempt that spoofed Google Docs and abused Google's OAuth system? How did the attackers compromise Google accounts? Find out what we know and how you can protect yourself.

By 
adware threat 1
How Adware Is Still a Threat to Your PC and How You Can Beat It

Malicious popup adverts on your PC or mobile might not be as devious as newer online threats, but they remain a problem. Think adware is a thing of the past? Think again.

By 
protect-online-scams 1
How to Protect Yourself From 3 of the Biggest Online Scams Right Now

People will always fall foul of the scammers. Three of the most devastating scams at the moment have yielded hundreds of millions of dollars for cybercriminals. What can you do to protect yourself?

By 
security-forums 1
Listen to the Experts: The 7 Best Security Forums Online

If you need security advice, and you can't find the answers you need here at MakeUseOf, we recommend checking these leading online forums.

By 
future-malware-virus 1
Can Cybersecurity Keep Up? The Future of Malware and Antivirus

Malware is constantly evolving, forcing antivirus developers to maintain pace. Fileless malware, for instance, is essentially invisible -- so how can we defend against it?

By 
 1
Twitter Now Supports Two-Factor Authentication

Twitter has added third-party two-factor authentication for the first time, in a move that will keep accounts much safer. Previously, there were only two options. Here's how to do it.

By 
linux-security 1
5 Security Tools You Should Have on Linux

From the start, Linux is quite secure, especially when compared to other operating systems such as macOS or Windows. Even so, it's good to build on that, starting with these tools.

By 
ipvanish-vpn 1
In-Depth Review: IPVanish - Flexible, Trustworthy VPN for Every Device

Looking for a VPN? IPVanish is a solid, outstanding option with 256-bit AES encryption, with SOCKS5 obfuscation for logging into VOIP and P2P services to maintain your privacy where encryption isn't possible.

By 
uninstall-popular-apps 1
Uninstall Now! 5 Popular Apps With Major Security Vulnerabilities

Is every app you're using completely secure? Some highly-recognizable pieces of software are among the least secure. Here are five popular apps with significant security vulnerabilities.

By 
 1
Is Ransomware Really as Terrifying as You Think?

Ransomware is a regular nuisance. A ransomware infection takes your computer hostage, and demands payment for release. Often, payment doesn't secure your personal files. But is it really as terrifying as you think?

By 
security-soft-insecure 1
This Security Software Is Insecure! 5 Tools You Should Get Rid Of

Security software isn't perfect; developers can accidentally introduce a bug, or compromise a user's safety with a flaw. Let's look at five "security" apps and tools that you should delete right now.

By 
pass-managers-not-safe 1
4 Reasons Password Managers Aren’t Enough to Keep Your Passwords Safe

Password managers are valuable in the ongoing battle against hackers, but they don't offer sufficient protection on their own. These four reasons show why password managers aren't enough to keep your passwords safe.

By 
67 68 69 70 71
Page 69 / 75