How-To Geek

Cybersecurity

Page 2 - Jump to the First Page

Readers like you help support How-To Geek. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Malware warning image 1
Mac
This Mac Utility Is Now Malware

Get rid of it, now.

By 
Microphone switch and USB-C port on the back of the Sonos Era 100 1
Web
Microphone Jammers Promise Better Privacy, But How Do They Work?

You never know who might be listening.

By 
Graphic featuring the pCloud Pass app open on a MacBook and iPhone 1
Encrypt Your Passwords Across Devices With pCloud Pass

This article is sponsored by pCloud.

By 
 1
1Password's Update Makes Family Subscriptions Even Better

A good password manager is basically a necessity these days, and 1Password is one of the best ones out there.

By 
 1
Toyota's New Data Breach Affects 260,000 Car Owners

Another day, another security breach.

By 
 1
MSI Just Had a Security Breach

Not another one.

By 
WD_BLACK 5TB P10 Portable External Hard Drive laying beside an Xbox and controller 1
Google Tensor 1
Closeup of a computer screen with PuTTY configuration options visible. 1
How Is SSH Different From Telnet?

SSH is vastly more secure than TELNET, which ought to be retired.

By 
A hand holding up a smartphone displaying the Uber logo. 1
Uber Has Suffered a Data Breach, Once Again

We can't get a break, can we?

By 
Computer screen featuring an email inbox full of emails 1
How BIMI Will Make It Easier to Trust Email Messages

BIMI should help pave the way to a more trustworthy inbox once it's fully implemented.

By 
Firefox Dark Mode Header 1
Firefox Relay Can Give You a Burner Phone Number for Spam

Protect your phone number online.

By 
A hand holding up a smartphone displaying the Uber logo. 1
Samsung logo sign. 1
Samsung Just Had a Data Breach

Not another one.

By 
Lastpass on a phone screen 1
LastPass Just Had a Security Breach

Nothing is bulletproof on the Internet.

By 
PayPal logo 1
PayPal Invoice Scams Aren't Going Away: Here's How to Avoid Them

Scammers are using PayPal's invoice system to send payment emails that look real.

By 
 1
Web
BadUSB: The Cyber Threat That Gets You To Plug It In

A recent spate of USB-based cyberattacks has hit organizations in the US.

By 
 1
How to Find Vulnerabilities In Containers and Files With Grype

Grype is an open-source vulnerability scanner that finds weaknesses within container images and filesystem directories.

By 
 1
How to Detect and Defeat Cryptominers in Your Network

Mining for cryptocurrency isn't illegal.

By 
 1
How to Check If Your Server Is Vulnerable to the log4j Java Exploit (Log4Shell)

A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it.

By 
1 2 3 4
Page 2 / 4
See more articles +