Cybersecurity
Page 2 - Jump to the First Page
Readers like you help support How-To Geek. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Microphone Jammers Promise Better Privacy, But How Do They Work?
You never know who might be listening.
1Password's Update Makes Family Subscriptions Even Better
A good password manager is basically a necessity these days, and 1Password is one of the best ones out there.
How BIMI Will Make It Easier to Trust Email Messages
BIMI should help pave the way to a more trustworthy inbox once it's fully implemented.
PayPal Invoice Scams Aren't Going Away: Here's How to Avoid Them
Scammers are using PayPal's invoice system to send payment emails that look real.
BadUSB: The Cyber Threat That Gets You To Plug It In
A recent spate of USB-based cyberattacks has hit organizations in the US.
How to Find Vulnerabilities In Containers and Files With Grype
Grype is an open-source vulnerability scanner that finds weaknesses within container images and filesystem directories.
How to Check If Your Server Is Vulnerable to the log4j Java Exploit (Log4Shell)
A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it.