MUO

Online Security

Page 8

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Digital Image of interconnected locks and cyber security 1
VPN
How to Set Up a Private VPN With TurnKey GNU/Linux

Private VPNs give you greater control and privacy, but how do you set one up? Here's how to use the free TurnKey GNU/Linux to create your own VPN.

By 
Bald Man With Headphones Using ChatGPT on Desktop in the Dark 1
Is ChatGPT Safe? 6 Cybersecurity Risks of OpenAI's Chatbot

ChatGPT can be a useful tool, whether your intentions are good or for ill. This means if you want to engage in fraud, ChatGPT can help.

By 
digital graphic of chained padlock with skull on front 1
Can All Ransomware Be Decrypted?

Worried about ransomware? You've probably heard that IT experts can use decryptor tools to unlock your data, but is that true of all ransomware?

By 
Man Working on a Laptop 1
What Is Vulnerability Remediation and Why Is It Important?

It's better to discover your own weak spots and alleviate them than to find out what they are during an attack.

By 
Various Devices Connected to a Cloud Network 1
11 Endpoint Security Best Practices You Must Follow to Stay Protected

If your employees can access company data using personal devices, they may be the weakest link in your security. Here's how to keep your network safe.

By 
Black Lady in Front of a Laptop 1
What Is Defense in Depth? How to Stop Cyberattacks Using Layered Security

Don't stop with one layer of defense when you can have several. It's the surest way to deter attackers and keep your data safe.

By 
Fingers Typing on a Laptop Keyboard 1
How to Check for and Remove a Keylogger on Your Windows PC

What you type can reveal a lot about the sites you visit, the people you talk to, your passwords, and your most personal information.

By 
OneNote logo inside Sony Android Phone 1
How Hackers Are Using OneNote Files to Spread Malware

Do you download OneNote files as attachments? Most people trust such files. But they could download malware onto your device.

By 
Image of Apple, App Store, and Apple Store gift cards 1
How to Recognize and Avoid Free Gift Card Scams: 7 Warning Signs

Received an email or social media message saying you've won a free gift card? It's likely a scam. Here's how to tell.

By 
Doctors Working on a Computer 1
5 Ways to Measure Cyber Risks in Healthcare

Healthcare institutions are prime targets for cyberattacks and various forms of fraud. Whether as a worker or a patient, what should you look out for?

By 
cybersecurity padlocked data 1
What Is Security as a Service?

Security as a Service is a model that means you don't require your own security experts; that's one of many reasons to consider SECaaS providers.

By 
blue lock graphic on laptop on desk 1
TunnelBear vs. Windscribe vs. AtlasVPN: Which Free VPN Service Is Best?

These three VPN services offer free plans, but which is best? We compare security features, speeds, limitations, and more to find out.

By 
mobile phone showing a security sign turned on 1
The Top 10 Mobile App Security Threats That Put Your Data at Risk

Mobile apps have become one of the most common ways for cybercriminals to gain access to devices and suck up user data.

By 
Using a VPN on a phone 1
VPN
Should You Only Use Independently Audited VPNs?

Some VPNs advertise that they're independently audited, but what does this mean? Are those the only trustworthy VPNs?

By 
black and white jigsaw puzzle with red skull in missing piece 1
Jigsaw Ransomware: What Is It and Are You at Risk?

This often-used ransomware can encrypt your data and threatens to delete your files if you don't pay quickly.

By 
vpn app active on smartphone 1
What Are the Pros and Cons of Avira's Free Phantom VPN?

Avira offers a free VPN for users, but how good is the service if you don't have a paid-for subscription?

By 
Man Smiling and Texting Outside 1
Fog Data Science and Law Enforcement Are Buying Your Data: What Can You Do?

It's legal for apps to sell your data, but is it okay for companies to buy that information without your consent?

By 
Green Android Symbol Placed Beside a White Box 1
DNS
Android's Private DNS Feature: Everything You Need to Know

Most web traffic comes from mobile devices, and most of those devices run Android. Here is a simple way to better secure what we do online.

By 
WhatsApp logo infront of padlock illustration 1
How to Make WhatsApp More Secure and Private: 8 Tips

Protect your privacy and security on this instant messaging app.

By 
An attacker with a clickjacking attack 1
Here’s Why You Might Be Sharing Your Camera With a Cyberattacker

A hacker might be spying on you via your webcam and microphone. And you allowed them that access. Here's how.

By 
6 7 8 9 10
Page 8 / 75