MUO

Security Risks

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

ai voice cloning on smartphone
What Is an AI Voice Clone Family Scam? How to Spot It

AI voice cloning is incredibly easy, and it can be used to manipulate your loved ones.

By 
Developer options enabled on an Android phone.
Is It Safe to Enable Android Developer Options?

The hidden Developer Options menu gives you more control over your Android device, but weigh the pros and cons before enabling it.

By 
making https less secure
What Is SSL Stripping and How Can You Defend Against It?

By downgrading a secure HTTPS connection to HTTP, a hacker could intercept all your data and alter what you see online. Here's how.

By 
A man sitting at a table and browsing a website on his laptop.
5 Red Flags to Identify a Phishing Website

Phishing isn't just for email or social media—you can also land directly on a phishing website. Here are some of the top indicators.

By 
Airline passengers sitting in a flight and watching their screens.
How Secure Is Airplane Wi-Fi?

Airplane Wi-Fi keeps you connected while you're tens of thousands of feet in the air. It's convenient, but is it secure?

By 
Person wearing hoodie and a neon mask
Cyberattacks on Gaming: Why the Risks Are Increasing for Gamers

Gamers, it’s high time to level up your security! Here's why cyberattacks on the games industry have increased.

By 
An Intel CPU with AMT support
Can Your Computer Be Accessed Remotely While It’s Off?

Can a hacker get into your PC when it's powered down? Yes, it's possible; fort instance, using Intel's Active Management Technology...

By 
Laptop in a cafe
9 Things You Should Never Do Using Public Wi-Fi

Accessing the internet using public Wi-Fi is dangerous. Here are the nine things you should avoid doing while using an unsecured network.

By 
up close photo of wet spider web on black background
Deep vs. Dark Web: What's the Difference and Which Is Most Dangerous?

The internet is made up of many layers, including the deep web and the more notorious dark web. But what are the risks of each?

By 
Person scanning QR Code on a parcel while sitting in a car
Are QR Codes Safe to Scan? What to Do if You Scanned a Fake One

Yes, QR codes can be dangerous, so you can't trust them all. Here's why scammers make fake QR codes and what to do if you fall for it.

By 
An illustration of fake ChatGPT logos
These 9 Fake ChatGPT Virus and Malware Apps Can Steal Your Data

Does ChatGPT have viruses? Malicious counterparts certainly do. Here are nine fake chatbot alternatives that you need to steer clear of.

By 
hot news
The Ultimate Guide to Cybersecurity Trends and Threat Awareness

Here are six strategies for keeping pace with ever-evolving cyber threats and upgrading your security game.

By 
disassembled view of PC hardware
What Are Microarchitectural Attacks?

Also known as side-channel attacks, microarchitectural attacks target the vulnerabilities in your hardware.

By 
An android phone placed on top of a keyboard
6 Security Threats Android Users Face in 2023

Your Android smartphone faces a lot of problems courtesy of cybercriminals. Here's what to watch out for right now.

By 
edge firefox chrome opera and brave logos
Update Everything: This Critical WebP Vulnerability Affects Major Browsers and Apps

A major vulnerability, CVE-2023-4863, can give hackers remote access to your whole system. Here's what to do.

By 
Wave browser logo on black background
What Is Wave Browser? Is It a Virus?

Yes, Wave is a genuine browser, but that doesn't mean it's not malicious too. Here's what to do if you've accidentally installed this service.

By 
cogs interacting against a purple screen
What Is Data Exfiltration? How Can You Stop It Happening to You?

It doesn't matter if your system carries lots of data or a small amount of it: you need to protect it from many threats, including hacks and phishing.

By 
Man walking along a sidewalk during nighttime
How Do Hackers Sell and Trade Your Data in the Metaverse?

Inside the metaverse data marketplace... Let's explore the dark side of the metaverse, where personal data is a precious commodity.

By 
kneeling down in a futuristic environment
The 9 Top Technology Trends That Are Shaping the Future of Cybersecurity

The latest tech trends can help you future-proof your cyber defenses. Here are the technologies you need to keep an eye on.

By 
closeup shot of fake money and scam letters on table
What Is the Geek Squad Email Scam? How to Avoid It

Have you received an email from Geek Squad confirming a transaction that you haven't placed? This might be a scam. Here's what to do.

By 
See more articles +