MUO

Security

Page 8

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
crack hashes on linux with hashcat 1
How to Use hashcat to Crack Hashes on Linux

Cracking passwords is an important skill to learn if you're into penetration testing. Here's how you can crack hashes on Linux using hashcat.

By 
person checking stock price with a line chart on phone 1
What Is a 51% Attack?

One of a blockchain’s greatest strengths could be one of its biggest weaknesses, but thankfully the flaw isn’t easy to exploit.

By 
pwnkit bug linux 1
What Is the PwnKit Vulnerability Affecting Linux Distributions?

PwnKit, a new vulnerability discovered on Linux systems, grants full superuser privileges to local users. Here's everything you need to know.

By 
Pointer hovering over the word  1
5 Ways to Improve Linux User Account Security

Want to safeguard your Linux system against the various threats caused by unprotected user accounts? Here are some helpful tips to get started.

By 
Nuki Smart Lock with mobile app 1
Can Smart Locks Be Hacked?

How secure are smart locks? We’re taking a closer look and providing tips on how to make your lock even more secure.

By 
A close-up on a fax machine. 1
Fax
6 Reasons Fax Machines Are Still in Use in 2022

You might not have ever seen a fax machine, let alone used one, but some people are keeping theirs up and running for good reasons.

By 
an upclose shot of a man in a blue button-down writing on paper at a desk 1
Should You File a Claim in a Data Breach Settlement?

Data breaches are serious, but is it worth filing a claim?

By 
Photo of industrial area 1
9 Times Hackers Targeted Cyberattacks on Industrial Facilities

Industrial facilities face several threats, including ones from the online world.

By 
Person using MacBook Air 1
The 9 Best Linux Distros for Privacy-Focused Users

Switch to these top-rated Linux distros to enhance your privacy and security online.

By 
Sending an Email 1
What Is Email Security Policy and How Does It Work?

Having an email security policy can protect you and your company from malicious threats.

By 
Internet Data Interface 1
The 10 Most Effective Data Security Solutions and How to Implement Them

Keeping your data safe is critical; here's what you can do to achieve this.

By 
security professionals auditing a linux pc 1
How to Perform Security Audits on Linux With Lynis

Your system's security should always be your topmost concern. Here's how to perform a security audit on a Linux system with Lynis.

By 
kodachi linux 1
Linux Kodachi: Extreme Privacy Protection Out of the Box

Want a system that leaves no trace of what you did online? Check out Linux Kodachi, a privacy-focused distro with built-in online security features.

By 
VPN on Mobile Phone 1
7 Key Features of Effective Data Privacy Solutions 

Data privacy is crucial, but not all solutions were created equally. Here's what you should look out for.

By 
Hacker on a Computer 1
6 Types of Cybercriminals and How They Operate

Cybercriminals operate in several different ways; here are the most common ones.

By 
Arlo security system 1
Arlo Announces the Arlo Security System: Here's What We Know So Far

Find out more about the company's option featuring NFC technology and more.

By 
Open MacBook on desk in dark room with hands in black fingerless gloves typing. 1
What to Do If You Get a Safari Compromised Password Alert in macOS

Password alerts can be scary and you should always treat them with caution. Learn how to deal with this specific type on your Apple computer.

By 
Parrot on a branch 1
How to Install and Test Parrot OS in VirtualBox

Virtual machines are a great way to test Linux distros without installing them on your computer. Here's how you can install Parrot OS in VirtualBox.

By 
Windows 10 laptop on desk 1
How to Fix the Windows Security App When It’s Not Starting or Crashing

If the Windows Security app fails to start, it can prevent you from making important security tweaks. Here's how to fix it.

By 
Facebook Pills Depicting Social Media Addiction 1
10 Reasons to Quit Facebook for Good

Hooked on Facebook? Be careful what you do on there. Here, we'll list several reasons why you should quit the social networking platform for good.

By 
6 7 8 9 10
Page 8 / 14