MUO

Security Risks

Page 3

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Person with money in front of an ATM 1
What Is an ATM Jackpotting Attack and How Does It Work?

ATMs dispense huge sums of cash every day, and that makes them a big target for hackers.

By 
spam email coming out of computer with surprised man feature 1
What Is a Spam Bot and How Do You Stop Them?

Have you spotted loads of suspicious comments on websites, social media, and instant messaging platforms? Spam bots might be the reason.

By 
workplace environment desks 1
What Are the Security Risks Associated With Quiet Quitting?

Quiet quitting is harmful for productivity and success, but it can also be a threat to your company's security. Here's what you can do.

By 
A Bitcoin token 1
4 Security Threats to Blockchain Networks You Need to Know About

Thinking of investing in cryptocurrency? You first need to know about the security risk posed to blockchain networks.

By 
Typing on Laptop in the Dark 1
What Is BlackCat Ransomware and How Can You Prevent It?

BlackCat is actually the name of a type of ransomware and the hacking group responsible for it. Here's what you need to know.

By 
Advent Calendar next to Christmas decorations 1
Security Advent: 24 Lessons to Remember This Christmas

Instead of a little treat each day in December, here's an Advent calendar that helps you build up your personal security, bit-by-bit.

By 
Server room with cloud, network and computer symbols 1
What Is a Privilege Escalation Attack?

As the name suggests, privilege escalation attacks can become very damaging, very quickly. So what are they? And how are they carried out?

By 
blurred photo of blue and purple computer coding 1
7 Common Ways Websites Are Hacked

Websites are always big targets for cybercriminals, but how do they actually go about hacking a site?

By 
cyber attack warning on tablet held by woman 1
Do You Need Antivirus if You Don’t Use the Internet?

Some of us have a device for offline use, but do you need an antivirus program is your device isn't connected to the internet at all?

By 
A person sitting on chair playing video games 1
7 Tips for Staying Safe While Engaging in Gaming Communities

Social channels related to video games are a good way of enhancing your experience. But they could also leave you open to scammers. Here's what to do.

By 
Photo of Person Typing on Computer Keyboard 1
What Is a Living-Off-the-Land Attack and How Can You Prevent It?

Cybercriminals don't need to install malware onto your system to attack you. They could silently use already existing programs to take control.

By 
web-app-increase-security-with-http-headers 1
What Are HTTP Security Headers and How Do You Use Them?

How can you increase the security of your website? Security headers are a great and simple way of keeping your visitors safe from hackers.

By 
Replay symbols shown before a desktop computer 1
What Is a Replay Attack? Here's Everything You Need to Know

It doesn't necessarily matter if you use encryption: you can still fall for this cyberattack, which can see you losing your personal details and cash.

By 
A laptop running code beside flower vases on a counter 1
What Is the VENOM Vulnerability and How Can You Protect Yourself From It?

You might have heard that the VENOM vulnerability might be worse than Heartbleed, but is that true? What is VENOM? What can you do about it?

By 
Semi Transparent Image of Privacy Icon on Circled Pattern  1
What Is an MFA Fatigue Attack and How Can You Protect Against It?

Getting too many push notifications for multi-factor authentication? You might be targeted by hackers using MFA fatigue attacks.

By 
large printing hewlett packard 1
Your Printer Contains Sensitive Data: 4 Ways to Safely Get Rid of It

Looking to get rid of your old printer? It might contain personal details you don't want falling into the wrong hands. So what can you do about it?

By 
locked laptop and skull flag 1
What Is Screen Locker Ransomware and How Can You Remove It?

Screen Locker is a duplicitous ransomware that locks you out of your device but doesn't necessarily encrypt all your data.

By 
Smartphone with a 3d Bitcoin logo  1
How to Tell If Your Smartphone Is Being Used to Mine Crypto

Cybercriminals can use your phone for malicious ends and eventually damage your hardware. So how can you spot this seemingly-silent attack?

By 
photo of tiger in river 1
What Is Big Game Hunting and Are You at Risk?

In the world of cybersecurity, big game hunting isn't anything to do with the most exotic animals; instead, it's how criminals focus on huge targets.

By 
iphone charging port next to lightning charging cable 1
What Is Juice Jacking? Why You Should Avoid Public Charging Stations

Are public charging stations for your smartphone dangerous? You could at least be a victim of juice jacking...

By 
1 2 3 4 5
Page 3 / 6