MUO

Security

Page 10

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
two-women-looking-up-at-many-security-cameras 1
6 Types of Security Systems for Your Home or Apartment

Buying or upgrading your home security system? Here are the six main types of security system you need to know about.

By 
AirTag on a key chain 1
Can Stalkers Track You Using Apple AirTags?

Apple AirTags are great at tracking your misplaced belongings, but they might be giving stalkers a chance to track you as well.

By 
Home office 1
What Is Endpoint Security and Why Is It Important?

Organizations face an increasing number of cyber threats. How can endpoint security help out?

By 
Online security  1
HTTPS vs. VPN: 5 Reasons You Do Need Both

HTTPS is fantastic for keeping you safe, but it does have a few weaknesses which a VPN can cover.

By 
isp carrier cybersecurity 1
Does Your ISP or Mobile Carrier Pose Biggest Cybersecurity Risk?

Generally speaking, we tend to trust our ISPs and smartphone carriers. But are they part of the problem?

By 
Photo of the Apple Park in California 1
The End of an Era: Is Big Tech in Trouble?

Many governments have grown tougher on big technology companies. Is this the end of an era for them?

By 
Private sign 1
Tails: The Linux Distribution That Makes You Completely Anonymous Online

Want to access the internet without leaving any traces? Check out Tails, a Linux distro that focuses on maintaining user privacy and anonymity.

By 
gmail website on laptop computer with company logos 1
Hide My Email vs. Email Protection vs. Masked Email: The Ultimate Email Privacy Showdown

Email privacy has become more and more important. But what's the best tool for using an anonymous address?

By 
Microsoft Windows Logo 1
What Is Virtualization Based Security in Windows?

Virtualization Based Security (VBS) is a crucial part of Windows 11, but what is it exactly?

By 
Photo of a laptop closing 1
How Can Zero-Trust Security Prevent Ransomware Attacks?

The traditional security model has proven ineffective against ransomware. Learn why zero-trust is the best approach to defeat cyber attacks.

By 
Photo of a boss in an office 1
Can Bosses Legally Spy on Home Offices?

Working from home doesn't mean that you're suddenly anonymous.

By 
android virus 1
Why You Should Uninstall Your Android Antivirus Software

If you take the right precautions and don't download dodgy apps you might not need to run antivirus software on your phone. Here's why.

By 
Picture showing a retro game 1
Are Bootleg Games Dangerous?

Many players turn to bootleg games to save money, but is it really worth the risk?

By 
kaspersky password manager 1
Everything You Need to Know About Kaspersky Password Manager

Kaspersky Password Manager is an excellent tool for dealing with all your password management needs. Learn all about it with our handy overview.

By 
Cybersecurity padlock with apple logo and blue background. 1
Mac
5 Internet Security Features Built Into Your Mac

Apple designed macOS to include a variety of powerful tools that protect you online. Here's what they all do.

By 
Photo of students taking a selfie 1
Why You Should Think Twice About Posting Back-to-School Pictures

Before posting back-to-school pictures, it's wise to think about the potential related security risks.

By 
smart assistant speaker 1
Can Smart Assistants Be Hacked?

Smart assistants are handy to have around the house, but are they safe from hacking?

By 
why are fewer people buying chromebooks 1
VPN
The 7 Best Free VPNs for Your Chromebook

Keep your Chromebook browsing discreet with these free solutions.

By 
Anonymous hacker's face in a black hoody with a PC on the table 1
8 Historic Data Breaches That Shook the World

Some data breaches have left a significant mark on the planet. But what were the most significant ones?

By 
Photo of a person looking at a map on their iPhone 1
How to Manage Which iPhone Apps Have Your Precise Location

If you don't want all of your iPhone's apps knowing exactly where you are, you can tweak these. Here's how.

By 
8 9 10 11 12
Page 10 / 14