MUO

Security

Page 11

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Lock Apps on Android 1
How to Lock Apps on Android

Looking to secure an app on your Android device to stop anyone from opening it? Here's how you can lock apps for additional security.

By 
African-American man using MacBook Pro at night 1
How to Set Up Back-Up Authenticator Codes for Your Google Account

If you've got a Google account, here's how you can add an extra layer of security to your account by setting up back-up authenticator codes.

By 
Person wearing gloves using a MacBook 1
How to Find and Edit Passwords in Keychain Access on a Mac

Do you need to find or update a saved password on your Mac? Here's how to use Keychain Access to do it.

By 
Wi-Fi icon on white desktop with open Macbook and clasped hands. 1
How to Create a Secure Ad Hoc Network in macOS

Create a computer-to-computer wireless network in macOS and secure it with a password.

By 
Tips for Chrome Safety 1
8 Tips to Make Chrome More Secure on Your Device

If you're an everyday Chrome user, here are eight tips to help make the browser more secure on your device.

By 
photo of anonymous person taking a selfie 1
How Thieves Are Borrowing Phones and Emptying Bank Accounts

Mobile banking is usually secure—unless you hand over your phone to a thief. Here's why you need to be careful.

By 
man holding phone 1
How to Quickly Change Compromised Passwords in Chrome for Android

If you've got passwords on any sites that have had data breaches, you should change them as soon as possible. Chrome on Android makes it easy.

By 
Photo of people working on insurance 1
What Is Cyber Insurance and Do I Need It?

As more people look to improve their online security, one area often looked at is cyber insurance. But what is it, and is it worth buying?

By 
telegram-safety 1
Why Telegram Isn't as Secure as You Think It Is

Many users laud Telegram for being a secure alternative to other instant messaging platforms. But how true is this?

By 
students at university 1
Why Is Ransomware Such a Big Threat to Universities?

Ransomware poses a significant threat to universities. But why is this the case, and how can you protect yourself?

By 
video call with a doctor  1
Is Telemedicine a Security Risk?

Telemedicine has become more popular and offers an alternative to visits that don't need to occur in person. But how secure is this technology?

By 
Code on a laptop screen 1
3 Reasons Why You Should Consider Domain Privacy Protection

Protecting your website's security is paramount. Here's why you should consider investing in domain privacy protection.

By 
Digital illustration of the Guy Fawkes mask. 1
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

By 
Network 1
What Is the NIST Cybersecurity Framework?

When thinking about online security, the NIST cybersecurity framework is one of the most popular implementation choices. But what is it?

By 
person typing on laptop in the dark 1
Dark Web vs. Deep Web: What's the Difference?

The dark web and deep web are often mistaken for being one and the same. But that's not the case, so what's the difference?

By 
getting targeted by ransomware 1
5 Surefire Things That’ll Get You Targeted by Ransomware

Ransomware is a serious threat to your online security, and doing these five things will increase the risk of an attack.

By 
hide apps android 1
How to Hide Apps on Android

Keep your most important Android apps private and protect them from prying eyes.

By 
Cyberattacker 1
5 Times Brute Force Attacks Lead to Huge Security Breaches

Online users are under constant threat from security breaches, and brute force attacks are a particular cause of concern. Here are some of the worst.

By 
Illustration of mobile phone, Blockchain logo, and React Native logo 1
The 8 Best Blockchain Apps Built With React Native

React native has helped several developers build robust blockchain apps. Here are eight of the best.

By 
Illustration of an online shopping icon 1
What Is the Triangulation Scam?

When shopping online, one scam you need to beware of is the triangulation scam. But what is it, and how can I spot the signs before it's too late?

By 
9 10 11 12 13
Page 11 / 14