MUO

Security

Keeping your personal data private and secure is paramount. Learn how to stay safe online with the best security software, manage your passwords, and recognize scams and other security risks.

Page 2

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
 1
Is "Scam Likely" Calling You? Here's How to Block Them

What is "Scam Likely" and what does this message mean? We look at how to block "Scam Likely" calls and reduce spam.

By 
digital graphic of padlock surrounded by electrical grid 1
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?

Cryptographic oracles can be great tools for hackers. Here's why.

By 
person using smartphone to interact with chatbot 1
3 Chatbot Privacy Risks and Concerns You Should Know About

Whether you're using ChatGPT or another chatbot, you need to be aware of the potential threats that put your data privacy into question.

By 
auctioneer's hammer gavel 1
Is DealDash a Scam or Can You Get Legit Bargains?

You might have seen DealDash's too-good-to-be-true ads. But is it a scam? If not, how does DealDash actually make money? Let's find out.

By 
Person accessing the Launchpad on a MacBook Pro 1
Mac
4 New Threats Targeting Macs in 2023 and How to Avoid Them

The threats our computers face today aren't the same ones we grew up with. Are Macs as immure as their reputation suggests?

By 
Stylized Computer Error Message 1
What Are Improper Error Handling Vulnerabilities?

Your app may be exposed to improper error handling vulnerabilities. Here's how.

By 
Router with padlock symbol  1
5 Ways to Encrypt Your Internet Traffic

How can you keep all your data secure? Encryption is the key. Here's how to take a comprehensive approach to securing your information.

By 
https link with green verification lock 1
Suspicious of a Website? How to Check if a Site Is Safe and Legit

You visit a site that asks for your personal information. Can you trust it? Here are seven signs to help you spot a fake or scam website.

By 
Person holds smartphone with text message symbols  1
SMS
Still Using SMS? You Should Stop: Here's Why

A lot of users still default to SMS on their smartphones. But that's bad news for your security and privacy. Here's why and what you can do.

By 
Apple devices on a desk 1
10 Apple Ecosystem Security Features That Keep You and Your Devices Safe

When you buy an Apple device, you don't have to worry too much about your privacy and security, thanks to Apple's security features.

By 
smartphone-listens 1
Does Your Phone Listen to You for Ads? Or Is It Just Coincidence?

Your phone has a built-in microphone. Is your phone listening to you and sharing your secrets with Google or Facebook?

By 
hooded man in dark alley holding spherical light 1
Is Your Private Information on the Dark Web?

Is your personal data on the dark web, being traded around by cybercriminals? Here's how to find out, and why your info is so valuable.

By 
A padlock and laptop  1
How to Add a Custom Pattern Lock to a Windows 10 or 11 PC

If you like the pattern locks you find on phones and tablets, why not add one to Windows with this guide?

By 
An illustration of fake ChatGPT logos 1
These 9 Fake ChatGPT Virus and Malware Apps Can Steal Your Data

Does ChatGPT have viruses? Malicious counterparts certainly do. Here are nine fake chatbot alternatives that you need to steer clear of.

By 
hot news 1
The Ultimate Guide to Cybersecurity Trends and Threat Awareness

Here are six strategies for keeping pace with ever-evolving cyber threats and upgrading your security game.

By 
disassembled view of PC hardware 1
What Are Microarchitectural Attacks?

Also known as side-channel attacks, microarchitectural attacks target the vulnerabilities in your hardware.

By 
Instagram logo and eye on black background 1
Is Someone Stalking You on Instagram? Here's How to Check

There are a few signs you can look for to see if someone is closely following your activity on Instagram.

By 
monochrome digital image of a black spiders web 1
VPN
Should You Use a VPN on the Dark Web?

There's a difference between the surface, deep, and dark webs, with the latter generally considered a breeding ground for illicit activities...

By 
Eye looking through a scope 1
What Is ZoomEye and How Is It Useful for Your Cybersecurity?

ZoomEye can prove useful for cybersecurity experts and enthusiasts, but also has its dangers.

By 
digital graphic of wifi symbol encircled by satellite on grid background 1
What Is Wi-Fi Eavesdropping? Understanding the Risks and How to Stay Secure

Cybercriminals can listen in on your Wi-Fi activity by eavesdropping. Here's how it works and how you can avoid it.

By 
1 2 3 4 5
Page 2 / 75
See more articles +