MUO

Security Tips

Page 12

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Image of a wallet with cash and Ethereum. 1
How Hackers Hack Crypto Wallets, and How to Protect Yourself

Cryptocurrency wallets are hot targets for hackers. But how do they get into these, and what can you do to protect yourself?

By 
Folder and file icons with a question mark are seen on a blue background 1
Downloaded a Suspicious File? Here’s How to Check if It Contains Malware

Accidentally downloaded a file you suspect might be a virus? Or what if you think a link goes to a malicious site? Here's what to do.

By 
Bluetooth on a phone 1
What Is the Braktooth Bluetooth Bug and Are You At Risk?

A new vulnerability for Bluetooth, called "BrakTooth," can really mess up your day. Here's how it works.

By 
man in glasses in rideshare uber lyft car 1
4 Ways to Protect Yourself From Rideshare Scams

Here's how to spot sophisticated rideshare schemes carried out by drivers and passengers.

By 
Ring Doorbell 1
Can Tenants and Landlords Install a Security Camera?

Whether you're a landlord or a tenant looking to install security cameras, here's what you need to know about keeping private matters private!

By 
QRcode 1
Do Menu QR Codes Pose a Risk to Your Privacy?

Digital versions of menu cards at restaurants might be preventing the spread of germs, but are they costing you your privacy? 

By 
photo of anonymous person taking a selfie 1
How Thieves Are Borrowing Phones and Emptying Bank Accounts

Mobile banking is usually secure—unless you hand over your phone to a thief. Here's why you need to be careful.

By 
Lock On Top of Keyboard 1
How to Craft Incident Response Procedures After a Cybersecurity Breach

We'll show you how to give hackers the boot by building a set of solid incident response procedures.

By 
surveillance spy watching 1
What Is Shoulder Surfing and How Do You Prevent It?

This in-person form of attack can compromise you when you're at an ATM, on your laptop, smartphone, or even entering a secure building. Here's why.

By 
Work Desk 1
8 Backend Security Risks and How to Prevent Them

It has become even more important to keep your system's backend secure, here's why.

By 
Photo of a wire plugged into an internet router 1
DNS
7 DNS Services to Protect Your Family and Network with Minimum Setup

These DNS services will ensure that your family is kept away from adult content and dangerous sites.

By 
students at university 1
Why Is Ransomware Such a Big Threat to Universities?

Ransomware poses a significant threat to universities. But why is this the case, and how can you protect yourself?

By 
Code on a laptop screen 1
3 Reasons Why You Should Consider Domain Privacy Protection

Protecting your website's security is paramount. Here's why you should consider investing in domain privacy protection.

By 
remote desktop cant find computer error 1
At Home and in the Office? How to Work Securely in a Hybrid Environment

Working in the office and off-site, like at home? Here's how employees and employers can maintain strong cybersecurity wherever they are.

By 
Macbook sitting on a desk in a dark room with its screen half closed. 1
Mac
5 Important Security Features Built Into Your Mac

Ever wondered what your Mac does to keep your data safe? Here are key security functions built into macOS that you should use to protect your system.

By 
padlock over laptop keyboard 1
50+ Security Tips to Protect Yourself When Browsing Online

Download our free PDF cheat sheet packed full of tips to help you stay safe and secure when you're online.

By 
Person trying to steal a credit card. 1
Has Your Credit Card Number Been Leaked?

The most common type of data breach, a credit card leak can happen any time a company's database is hacked.

By 
city landscape with 2021 written across it 1
What's New in Windows 10's August 2021 Security Update?

Let's talk about the good and the bad in Microsoft's August 2021 Security Update and how it affects you.

By 
encryption 1
Cryptology vs. Cryptography: What's the Difference?

Crypto this and crypto that, it's all the same, right? That's where you're wrong: cryptology and cryptography are different, and here's why.

By 
Contactless payment system with phone and payment machine touching 1
Are Contactless Payments Actually Secure?

You might be used to paying for items using contact-free methods through your credit card or smartphone, but is it really safe to use?

By 
10 11 12 13 14
Page 12 / 16