MUO

Security Tips

Page 3

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Two Men Working on Computers 1
What Is Security by Design and Why Is It Important?

What is the best way to approach a system's vulnerabilities? At the root. By doing this, security by design gives you peace of mind.

By 
close up shot of keyboard with snake icon in front center  1
What Is Snake Keylogger and Are You at Risk?

Just about any keylogger is bad news. Here's how to avoid getting bit by this specific one.

By 
lock icon in front of computer code 1
How to Create a Protected Route in React

Preventing unauthorized users from accessing your React page is critical for security. Here's how to do it.

By 
what out for red flags of tech scams 1
How to Avoid the "Financial Hardship Department" Email Scam

The Financial Hardship Department scam goes after your money when you have little to spare. Here's how to keep your money secure.

By 
Image of Sign-In Screen on Laptop 1
What Is Phishing-Resistant MFA and How Can You Implement It?

Multi-factor authentication makes your accounts more difficult to hack, but phishing gets around that. What can you do to make phishing ineffective?

By 
A laptop on a wooden table with a Bluetooth logo on it 1
Bluebugging: What It Is and How to Stay Safe From Bluetooth Exploits

Bluetooth is a convenience way to connect two devices together, but it's also a convenient way to hack them.

By 
How hackers make exe files PDF 1
How a Trojan Virus Pretends to Be a PDF Using the RLO Method

A file can look like a PDF but actually be a malicious EXE. Here's how you can tell the difference.

By 
An Image of a Hand Holding a USB Drive 1
What Is a USB Killer Attack? Everything You Need to Know

A USB drive can be a cybercriminal's way of funneling malware onto your PC, but that's not all—such a drive can physically fry your PC's internals.

By 
A Man Working on a Laptop With Headphone on Representing a Hacker 1
What Is Callback Phishing and How Can You Protect Against It?

A callback phishing email isn't actually dangerous. It's how you respond that leaves you vulnerable.

By 
 Image of Login Window on Laptop and Hacker Behind the Laptop  1
What Is FormBook Malware and How Do You Remove It?

Infostealer malware like FormBook can give someone else access to your most sensitive data. Here's how to stop that from happening.

By 
Lady Using Mobile Phone Outside 1
What Is a Mobile Risk Assessment? 5 Good Reasons to Perform One

If you don't know where you're at risk, you don't know what to defend. Here are ways to help determine the security of your mobile device.

By 
Black Woman on Laptop 1
Can Automation Replace People? 8 Key Roles Humans Play in Cybersecurity

Machine learning has helped computers do a better job of blocking attacks, but people still have a vital role to play in keeping data secure.

By 
Man Operating a Mobile Phone 1
What Is Mobile Threat Defense? How to Keep Smartphones Secure

With so much of our digital lives conducted on the go, it's not enough to keep our desktops and laptops secure. How do you guard mobile devices?

By 
Mockup of a Laptop Showing a Browser Hijacked With TabSearch Hijacker 1
What Is the TabSearch Hijacker? How to Remove It From Your Browser

Such malware can redirect your searches and take control of your browser in other ways, giving attackers access to more parts of your computer.

By 
An infected computer 1
Why You Shouldn't Have More Than One Antivirus Program on Your Windows PC

More antivirus programs mean more security, right? Not quite. Here's why.

By 
Couple watching retro Netflix 1
How to See Who Is Using Your Netflix Account (And Stop Them)

If you think someone else is using your account, Netflix lets you see who has access to your account and (crucially) stop them from doing so.

By 
Couple watching TV 1
12 Ways Hackers Can Attack and Take Control of Your Smart TV

Your smart TV is just another computer connected to your network, and there's a good chance it's not a well-protected one.

By 
deezer app on smartphone in man's hand 1
How to Protect Yourself After the Deezer Data Breach

Your Deezer account may be one of the 228 million that got leaked in a data breach. So, learn how to protect your personal information.

By 
A command line interface displaying a malicious code 1
Why You Should Update File Sharing Platform, Samba, Right Now

Vulnerabilities have been found in Samba, software that lets you access shared files. So here's why it's vital you install these updates.

By 
Advent Calendar next to Christmas decorations 1
Security Advent: 24 Lessons to Remember This Christmas

Instead of a little treat each day in December, here's an Advent calendar that helps you build up your personal security, bit-by-bit.

By 
1 2 3 4 5
Page 3 / 16