How-To Geek

Cybersecurity

Readers like you help support How-To Geek. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

Graphic featuring the pCloud Pass app open on a MacBook and iPhone 1
Encrypt Your Passwords Across Devices With pCloud Pass

This article is sponsored by pCloud.

By 
 1
1Password's Update Makes Family Subscriptions Even Better

A good password manager is basically a necessity these days, and 1Password is one of the best ones out there.

By 
 1
Toyota's New Data Breach Affects 260,000 Car Owners

Another day, another security breach.

By 
 1
MSI Just Had a Security Breach

Not another one.

By 
WD_BLACK 5TB P10 Portable External Hard Drive laying beside an Xbox and controller 1
Google Tensor 1
Closeup of a computer screen with PuTTY configuration options visible. 1
How Is SSH Different From Telnet?

SSH is vastly more secure than TELNET, which ought to be retired.

By 
A hand holding up a smartphone displaying the Uber logo. 1
Uber Has Suffered a Data Breach, Once Again

We can't get a break, can we?

By 
Computer screen featuring an email inbox full of emails 1
How BIMI Will Make It Easier to Trust Email Messages

BIMI should help pave the way to a more trustworthy inbox once it's fully implemented.

By 
Firefox Dark Mode Header 1
Firefox Relay Can Give You a Burner Phone Number for Spam

Protect your phone number online.

By 
A hand holding up a smartphone displaying the Uber logo. 1
Samsung logo sign. 1
Samsung Just Had a Data Breach

Not another one.

By 
Lastpass on a phone screen 1
LastPass Just Had a Security Breach

Nothing is bulletproof on the Internet.

By 
PayPal logo 1
PayPal Invoice Scams Aren't Going Away: Here's How to Avoid Them

Scammers are using PayPal's invoice system to send payment emails that look real.

By 
 1
BadUSB: The Cyber Threat That Gets You To Plug It In

A recent spate of USB-based cyberattacks has hit organizations in the US.

By 
 1
How to Find Vulnerabilities In Containers and Files With Grype

Grype is an open-source vulnerability scanner that finds weaknesses within container images and filesystem directories.

By 
 1
How to Detect and Defeat Cryptominers in Your Network

Mining for cryptocurrency isn't illegal.

By 
 1
How to Check If Your Server Is Vulnerable to the log4j Java Exploit (Log4Shell)

A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it.

By 
 1
Critical RCE Zero-Day Exploit Found in Popular Java Logging Library log4j, Affects Much Of The Internet

A critical remote code execution vulnerability has been found in log4j, a very popular logging tool used by most of the industry.

By 
 1
How the SAML Standard Provides Single Sign-On Services

Single Sign-On and zero trust networks depend on securely passing identification details back and forth between users, identity providers, and service providers.

By