MUO

Encryption

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

An illustration of a VPN on PC 1
VPN
Should You Use a Free VPN Chrome Extension?

Here are the pros and cons of installing a free VPN add-on to your Google Chrome browser.

By 
making https less secure 1
What Is SSL Stripping and How Can You Defend Against It?

By downgrading a secure HTTPS connection to HTTP, a hacker could intercept all your data and alter what you see online. Here's how.

By 
laptop on seabed with lightbulb hovering above 1
Deep vs. Dark Web: What's the Difference and Which Is Most Dangerous?

The internet is made up of many layers, including the deep web and the more notorious dark web. But what are the risks of each?

By 
digital graphic of padlock surrounded by electrical grid 1
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?

Cryptographic oracles can be great tools for hackers. Here's why.

By 
Router with padlock symbol  1
5 Ways to Encrypt Your Internet Traffic

How can you keep all your data secure? Encryption is the key. Here's how to take a comprehensive approach to securing your information.

By 
Person holds smartphone with text message symbols  1
SMS
Still Using SMS? You Should Stop: Here's Why

A lot of users still default to SMS on their smartphones. But that's bad news for your security and privacy. Here's why and what you can do.

By 
monochrome digital image of a black spiders web 1
VPN
Should You Use a VPN on the Dark Web?

There's a difference between the surface, deep, and dark webs, with the latter generally considered a breeding ground for illicit activities...

By 
Raspberry Pi 4 USB and Ethernet ports 1
How to Make a Raspberry Pi WPA Encrypted Wireless Hotspot Device

Need a secure Wi-Fi hotspot to share an Ethernet connection? Here's how to use a Raspberry Pi to create one.

By 
Woman in black jacket covering her face with her hands in frustration 1
Is Google Password Manager Safe and Secure?

Google might ask you if you want it to store your login credentials, but can you trust Google's own Password Manager? Is it safe to use?

By 
usinf a vpn in a cafe 1
VPN
8 Reasons Why Free VPNs Just Don't Cut It

VPNs are rightly popular, but that level of privacy doesn't come cheap. Sadly, free VPN services come with risks that may not be worth taking...

By 
silhouette photography of man in front of a screen 1
The Top 7 Anonymity Networks for Improving Online Privacy

Various technologies can help keep your data private online. Here are some of the best ways to stay anonymous.

By 
Green rope meshwork with an internet globe icon 1
What Is a MixNet and How Does It Work?

Looking for privacy and anonymity online? Don't immediately turn to VPNs or Tor: MixNets could be the answer.

By 
yellow vandalised mailbox 1
How to Send PGP-Encrypted Email on Linux With Evolution

Want to secure your conversations from prying eyes? Here's how you can send PGP-encrypted emails from your Linux PC with Evolution.

By 
person using vpn application on phone and laptop 1
VPN
4 Ways to Test a VPN's Encryption

How can you check that your VPN is working? Is it encrypting your data? Here are a few ways you can tell if your information is kept secure.

By 
Woman helping elderly man with payment on the internet using a laptop  1
The Top 7 Ways to Secure Your Personal Communications

Your personal communications should always be kept safe. Here's how you can protect them from prying eyes.

By 
VPN shield, laptop on background  1
VPN
Do VPNs Store Your Personal Information?

Yes, VPNs are supposed to keep you anonymous, but some still collect data. So how can you avoid this? And what data shouldn't a VPN collect?

By 
Close Up Photo of a Seahorse 1
How to Easily Encrypt and Decrypt Files With Seahorse on Ubuntu

Learn more about security and encryption using Seahorse in Linux.

By 
websites-store-password 1
The 7 Best Online Password Generators for Strong Random Passwords

Looking for a way to quickly create an unbreakable password? Try one of these online password generators.

By 
shopping for clothes on an e-commerce site 1
Develop Secure E-Commerce Websites With These 8 Top Tips

Customers will only use a website if they trust it. Here's how to secure that trust... while securing your shopping site!

By 
Cloud with key illustrating BYOK 1
What Is Bring Your Own Key, and Why Is It Important?

Worried about how data is kept in the cloud? Encryption is vital, but still has its issues. That's where BYOK comes in.

By 
See more articles +