How-To Geek

Cybersecurity

Readers like you help support How-To Geek. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

Outlook open on a Mac.  1
Is This a Phishing Email? 8 Warning Signs to Look Out For

Not sure if the email you received is a phishing scan? Well, don't panic and look for these warning signs.

By 
Person using the Lenovo Legion Slim 5 1
Web
How to Keep Your Devices and Data Secure While Traveling

You don't want your trip ruined by having your financial or social details compromised.

By 
Person using a web browser on the Google Pixel 8 Pro 1
9 Tips to Safely Browse the Web

Step into the online world with confidence!

By 
Mozilla Firefox logo 1
How to Improve Your Online Privacy With Firefox Multi-Account Containers

Firefox Multi-Account Containers make it harder for websites to track you around the web. Here's how to use them.

By 
A VPN running on a Google Pixel.  1
Web
VPN Blockers Explained: How to Avoid and Bypass Them

Switching servers, tunneling protocols, or your DNS settings can often bypass VPN blockers.

By 
Signage outside of an Xfinity retail location. 1
Web
Comcast Xfinity Data Breach Exposed 35 Million Customers

Private information, including the last four digits of customers' social security numbers, may have been acquired by hackers.

By 
The Proton Mail and Calendar logos over a purple background. 1
Proton Mail and Calendar Just Gained 38 New Improvements

The new features and improvements are based on user requests.

By 
Using passkey log-in with an Android app. 1
Google's Credential Manager Makes Passkeys Easier on Android 14

Google promises a 50% faster sign-in process when apps use passkeys.

By 
Google Chrome open on an iPad. 1
You Should Delete the Passwords from Your Old Browser

Your old browser poses a big security risk. Get it fixed!

By 
The VPN settings on Windows 10.  1
Can My ISP See If I'm Using a VPN, and Do They Care?

A VPN can help protect your privacy online. But what does your ISP think about that?

By 
Closeup of a digital display with blue and red skull and crossbones icons. 1
Web
Does a Factory Reset Remove Viruses?

Computer or smartphone infected? This can help.

By 
Password screen on laptop 1
Web
10 Bad Password Habits You Need to Break

It's time to take a hard look at your passwords.

By 
 1
Web
How to Protect Against Password Dictionary Attacks

Dictionary attacks threaten the security of your networks and platforms.

By 
ExpressVPN running on a desktop computer. 1
Do VPNs Hide Data Usage from ISPs or Cellular Carriers?

If you're trying to avoid a data cap, VPNs aren't the solution.

By 
The login screen for a web site with a spot for the user's email address. 1
Web
Credential Stuffing Is the Easiest Cyberattack to Avoid (Here's How to Do So)

You've probably never heard of it, but millions fall victim to it yearly.

By 
Sharing a password in Proton Pass. 1
Proton Pass Introduces Secure Password Sharing

Share passwords, credit card details, and more with friends or family.

By 
1Password logo on a green background. 1
Web
1Password Targeted by Hackers Following Okta Breach

User data was not compromised, and 1Password itself was not hacked.

By 
Two people exchanging passkeys 1
Web
Can You Share Passkeys with Friends and Family?

Some passkey managers allow you to share passkeys, while others don't.

By 
Signing into Amazon with a passkey. 1
You Can Now Sign Into Amazon with Passkeys

The company's passkey implementation is still a bit clunky, though.

By 
Tor Browser app icon introduced in version 13.0 1
Tor Browser 13.0 Finally Adds a Landscape Aspect Ratio

It also fixes the "red screen of death" and offers new app icons.

By 
See more articles +