MUO

Security

Page 7

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Privacy Please sign 1
7 Privacy-Focused Alternatives to Common Linux Software

Maintain privacy and keep your desktop safe by installing privacy-oriented alternatives to popular applications on Linux.

By 
photo of a flying drone 1
Can Drones Be Hacked?

Drones aren't commonly thought of as potential targets for hackers. So, are they at any particular risk?

By 
windows defender-like antivirus 1
Your Microsoft Defender Is Getting a Small (but Powerful) Upgrade

It can now prevent vulnerable drivers from installing themselves on your system.

By 
linux-directory-listing 1
Linux Kernel 5.17 Released, With Major Security Fixes But Not Much Else

After a short delay, Linus Torvalds has announced the latest version of the Linux kernel, version 5.17, which adds major security enhancements.

By 
tile tracker 1
How Tile's New Scan & Secure Feature Prevents Unwanted Tracking

The Tile app now makes it easier to detect unwanted tracking tags near you. Here's how you can get it, and how to use it.

By 
cyber security feature image 1
How to Beef Up Your Windows 11 Security

Windows 11 is definitely better than its predecessors when it comes to security. Here are some ways to dial it up even more.

By 
Google Cloud and Mandiant logos 1
What Is Mandiant and Why Is Google Buying It?

Google is paying big bucks for Mandiant, but what even is it? And why is the company spending so much money?

By 
Man on Computer 1
What Is Hashing and How Does It Work?

Hashing can help you protect your data, but what is it?

By 
photo of a woman with their laptop in bed 1
6 Tips to Stop Yourself From Getting Catfished

Getting catfished is something that many people have experienced in the online space. Luckily, you can protect yourself.

By 
A stack of bitcoins on top of hundred dollar bills  1
How Do Criminals Launder Money with Bitcoin?

Many criminals use cryptocurrencies to complete their operations, and Bitcoin is a popular choice.

By 
woman with laptop working 1
9 Advanced MySQL Security Tips

Secure your MySQL database server by following these easy tips.

By 
Woman on Computer 1
What Is Automated Penetration Testing and How Does It Work?

Keeping yourself safe online is critical, and automated penetration testing is one possible way to do this.

By 
Hands typing on the vivd blue keyboard of a Surface tablet 1
SSH
How to Copy an SSH Key to Your Server and Connect Without a Password

Secure passwordless login might seem like the stuff of fantasy, but it's easily achievable with SSH keys.

By 
person with an anonymous mask 1
How Do Cybercriminals Use Cryptocurrency?

Cryptocurrencies have become more popular among regular people, but they're also a tool that cybercriminals use.

By 
incident-detection 1
How Long Does It Take to Detect and Respond to Cyberattacks?

Fast detection and response measures can mitigate the damages of a cyberattack. But are businesses reacting fast enough?

By 
microsoft edge logo 1
What Is Automatic HTTPS? How to Enable It in Microsoft Edge

Automatic HTTPS helps you browse the web safely. Here's how to activate it in Edge.

By 
west virginia policeman in uniform looking back at arrest being made 1
How Does Law Enforcement Use Data to Solve Crime?

Data can form an important part of solving crimes, but how exactly is it used?

By 
Woman working on laptop 1
The Top 10 Penetration Testing Tools for Security Professionals

If you're wondering how the pros test for penetration, this guide will give you a helping hand.

By 
reset password on ubuntu 1
How to Quickly Reset a Forgotten Password on Ubuntu

If you've somehow forgotten your Ubuntu password, don't worry, it's easy to log back in to your system by resetting the password.

By 
tails vs linux kodachi  1
Tails vs. Linux Kodachi: Which Privacy Protection Distro Should You Choose?

When it comes to maintaining privacy on Linux, you have two options: Tails and Linux Kodachi. But which one should you go for? Let's find out.

By 
5 6 7 8 9
Page 7 / 14