MUO

Encryption

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

3d printed raspberry pi pico tpm sniffing tool
A close-up of a key in a lock
SSH
How to Generate an SSH Key on Linux

Learn how to generate an SSH key and securely log on to remote servers.

By 
Person connecting to remote servers using a desktop PC
SSH
How to Generate an SSH Key in Windows: 2 Methods

Secure your server connection with this quick guide to generating SSH keys in Windows 11 and 10.

By 
top down view of womens hands on laptop showing outlook logo
How to Encrypt Email Sent in Microsoft Outlook

Your email is mostly secure, but you could make it so much safer.

By 
digital graphic of lock and shield with person tapping with finger behind
7 Cybersecurity Trends and Predictions for 2024

As 2024 draws closer, we look at the challenges and cybersecurity developments likely to play a big part in our New Year celebrations...

By 
An illustration of a VPN on PC
VPN
Should You Use a Free VPN Chrome Extension?

Here are the pros and cons of installing a free VPN add-on to your Google Chrome browser.

By 
making https less secure
What Is SSL Stripping and How Can You Defend Against It?

By downgrading a secure HTTPS connection to HTTP, a hacker could intercept all your data and alter what you see online. Here's how.

By 
up close photo of wet spider web on black background
Deep vs. Dark Web: What's the Difference and Which Is Most Dangerous?

The internet is made up of many layers, including the deep web and the more notorious dark web. But what are the risks of each?

By 
digital graphic of padlock surrounded by electrical grid
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?

Cryptographic oracles can be great tools for hackers. Here's why.

By 
Router with padlock symbol
5 Ways to Encrypt Your Internet Traffic

How can you keep all your data secure? Encryption is the key. Here's how to take a comprehensive approach to securing your information.

By 
Person holds smartphone with text message symbols
SMS
Still Using SMS? You Should Stop: Here's Why

A lot of users still default to SMS on their smartphones. But that's bad news for your security and privacy. Here's why and what you can do.

By 
suspicious person covered in binary
VPN
Should You Use a VPN on the Dark Web?

There's a difference between the surface, deep, and dark webs, with the latter generally considered a breeding ground for illicit activities...

By 
Raspberry Pi 4 USB and Ethernet ports
How to Make a Raspberry Pi WPA Encrypted Wireless Hotspot Device

Need a secure Wi-Fi hotspot to share an Ethernet connection? Here's how to use a Raspberry Pi to create one.

By 
Woman in black jacket covering her face with her hands in frustration
Is Google Password Manager Safe and Secure?

Google might ask you if you want it to store your login credentials, but can you trust Google's own Password Manager? Is it safe to use?

By 
usinf a vpn in a cafe
VPN
8 Reasons Why Free VPNs Just Don't Cut It

VPNs are rightly popular, but that level of privacy doesn't come cheap. Sadly, free VPN services come with risks that may not be worth taking...

By 
silhouette photography of man in front of a screen
The Top 7 Anonymity Networks for Improving Online Privacy

Various technologies can help keep your data private online. Here are some of the best ways to stay anonymous.

By 
Green rope meshwork with an internet globe icon
What Is a MixNet and How Does It Work?

Looking for privacy and anonymity online? Don't immediately turn to VPNs or Tor: MixNets could be the answer.

By 
yellow vandalised mailbox
How to Send PGP-Encrypted Email on Linux With Evolution

Want to secure your conversations from prying eyes? Here's how you can send PGP-encrypted emails from your Linux PC with Evolution.

By 
person using vpn application on phone and laptop
VPN
4 Ways to Test a VPN's Encryption

How can you check that your VPN is working? Is it encrypting your data? Here are a few ways you can tell if your information is kept secure.

By 
Woman helping elderly man with payment on the internet using a laptop
The Top 7 Ways to Secure Your Personal Communications

Your personal communications should always be kept safe. Here's how you can protect them from prying eyes.

By 
See more articles +