MUO

Online Security

Page 72

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
trojan-virus-android 1
How to Avoid Downloading Trojans to Your Android Device

Trojan attacks are sneaky because they can steal your personal details and sensitive data without you even realizing it. Here's how to avoid Trojan infections on Android devices.

By 
content-filter 1
4 Big Reasons to Start Using a Content Filter at Home

Don't you hate it when your web browsing is curtailed by an "Access Denied" page? If you aren't using a content filter at home, here's why you should reconsider.

By 
windows-10-defender 1
4 Reasons to Use Windows Defender in Windows 10

In the past, Windows Defender was overshadowed by other options, but now it's quite a contender. Here are a few reasons why you should consider dropping your security suite in favor of Windows Defender.

By 
harassment-online 1
What You Should Actually Do When Harassed Online

The Internet has changed bullying. Let's take a look at what has changed, and what you can do if you find yourself on the receiving end of cyber harassment.

By 
Website Certificate Featured 1
How to Match a Website Certificate With Its True Owner

You might have never viewed a website certificate before, but it's easy to do in any browser, and can give you clues when you receive a certificate warning.

By 
bug-bounty 1
25 Awesome "Bug Bounty" Programs for Earning Pocket Money

If you have expertise in security protocols, you could make some extra money hunting for bugs in popular apps and websites, and being rewarded with a bug bounty. Here are the best-paying programs in 2016.

By 
 1
The Ultimate Ransomware Website You Should Know About

Ransomware is a growing threat, and you should do everything you can to prevent it. Whether you need info or need help after being hit by ransomware, this awesome resource can help.

By 
security-threats-mac 1
What Security Threats Face Mac Users In 2016?

Deserved or not, Mac OS X has a reputation for being more secure than Windows. But is that reputation still deserved? What security threats exist for the Apple platform, and how are they affecting users?

By 
encryption-myths 1
Don't Believe These 5 Myths About Encryption!

Encryption sounds complex, but is far more straightforward than most think. Nonetheless, you might feel a little too in-the-dark to make use of encryption, so let's bust some encryption myths!

By 
 1
Use This Trick to Make Google's Two-Step Login Less Annoying

Two-factor authentication is an awesome way to protect your Google account, but Google came up with a better way than typing codes. Here's how to enable it!

By 
google-hidden-gems 1
7 Hidden Gems from Google That Can Still Surprise You

Add a little fun and education to everyday tasks with the help of seven brilliant tools from Google.

By 
suspicious-linkedin 1
Should You Accept LinkedIn Invites from Strangers?

A recent survey found that 24% of LinkedIn users have connected with strangers, despite LinkedIn's repeated warnings not to. Could this explain how LinkedIn has become a vector for spear-phishing and other scams?

By 
 1
How to Disable Apps That Put Your Twitter Account at Risk

If you use your Twitter account to log into third-party sites, you may be putting your social media profile at risk! Here's what to do about it.

By 
online-safety-2016 1
Understanding How to Stay Safe Online in 2016

Why do some users blindly wander the Internet with the bare minimum of online security software installed? Let's look at some commonly misconstrued security statements, and make the right security decisions.

By 
user avoiding social engineering attacks 1
How To Protect Yourself From These 8 Social Engineering Attacks

What social engineering techniques would a hacker use and how would you protect yourself from them? Let's take a look at some of the most common methods of attack.

By 
A hook trying to phish emails  1
How to Avoid Phishing Emails in Gmail With One Trick

There's a neat trick that Gmail users can use to avoid all kinds of phishing emails. Here's how you can take advantage of it now.

By 
biometrics-not-future 1
6 Reasons Why Biometrics Are NOT the Way of the Future

Biometrics have often been seen as the "future" of personal identification, but there are many reasons why that may never actually come to pass.

By 
disable-webcam 1
Why You Should Disable or Cover Your Webcam Right Now

If you aren't careful, hackers can easily gain access to your webcam and spy on you without your knowledge. So you have two options: disable the camera or cover it up.

By 
password-leaks 1
Password Leaks Are Happening Now: Here's How to Protect Yourself

Password leaks happen all the time, and there's a chance one of your accounts will be involved, if it hasn't happened already. So what can you do to keep your accounts safe?

By 
twitter-leaked 1
How to Check If Your Twitter Password Has Leaked & What to Do Next

Apparently over 32 million Twitter accounts and passwords have been leaked, according to TechCrunch. Learn how to see if your account is affected, and secure your account before it's too late.

By 
70 71 72 73 74
Page 72 / 75