MakeUseOf

Sandeep Babu-Staff Writer for Security

Sandeep Babu

Staff Writer for Security

About Sandeep Babu

Sandeep Babu has an MA in English literature from Jamia Millia Islamia, New Delhi. He has been writing in the cybersecurity domain since 2019.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Cookies Places on a Mobile Phone to Represent Pass the Cookie Attack  1
What Is a Pass-the-Cookie Attack? How to Stay Logged In to Websites Safely

Someone doesn't need to know your passwords if they successfully steal your browser cookies instead.

Binary Magnifying Glass Hand  1
What Is Content Disarm and Reconstruction? How CDR Tools Protect You From Malicious Files

A dirty file can compromise your entire network, but there are tools you can use to keep your devices clean.

Various Shapes and Objects Assembled Together to Represent API 1
API
How to Manage API Security Risks to Boost Your Defenses

Hackers often target not the source of data, but the API itself.

An Image of a Hand Holding a USB Drive 1
What Is a USB Killer Attack? Everything You Need to Know

A USB drive can be a cybercriminal's way of funnelling malware onto your PC, but that's not all—such a device can physically fry your PC's internals.

Numbers Projected on a Face 1
What Is a Zero-Knowledge Proof in Cybersecurity and How Does It Work?

How do you verify information without sharing access? This is the challenge zero-knowledge proofs are trying to solve.

An Image of the Charger Side of a USB Cable 1
USB
What Is a USB Condom and Why Should You Get One?

Use a USB condom to practice safe charging when plugging into ports in public places.

Chain in Grey Background to Represent Supply Chain 1
9 Ways to Prevent Supply Chain Attacks

Your weakest link may not be your own network, but the partners you depend on.

Card Having a Question Mark Attached to a Key 1
Can You Trust the Security of Password Managers?

For the most part, yes. But be sure to do your homework beforehand. Some password managers are safer than others.

A Finger Resting on a Smart Phone and Three Tablets in the Background 1
7 Common Endpoint Security Challenges and How to Overcome Them

It is essential to improve endpoint security to ensure overall network security. Uncover these common challenges and learn how to overcome them.

A Smartphone Screen Showing the Conrrolpanel for Smarthome devices  1
11 Ways to Keep Your IoT Devices Secure

Houses and business premises are often filled with smart home devices, but these can be exploited by equally smart hackers. Here's what to do.

A Man Face in Focus to Represent Facial Recognition 1
What Is ClearView AI and Why Should You Care About It?

ClearView AI has a database of faces taken from online platforms. That might include your face. Here's everything you need to know.

The Thunderbird logo with a darkened and blurred screenshot of the application in the background. 1
How to Encrypt Email in Thunderbird

Thunderbird comes with the option for end-to-end encryption, but the process can be convoluted. Here's what you need to know.

Various Devices Connected to a Cloud Network 1
11 Endpoint Security Best Practices You Must Follow to Stay Protected

If your employees can access company data using personal devices, they may be the weakest link in your security. Here's how to keep your network safe.

Fingers Typing on a Laptop Keyboard 1
How to Check for and Remove a Keylogger on Your Windows PC

What you type can reveal a lot about the sites you visit, the people you talk to, your passwords, and your most personal information.

Green Android Symbol Placed Beside a White Box 1
DNS
Android's Private DNS Feature: Everything You Need to Know

Most web traffic comes from mobile devices, and most of those devices run Android. Here is a simple way to better secure what we do online.

Uninterested Formal Man Looking at a Laptop Screen  1
What Is Cybersecurity Fatigue and How Can You Overcome It?

Bored of keeping your accounts secure? It's nonetheless a necessity, and any fatigue can mean your security is at risk.

A Hang Sign Showing Free Wi-Fi Inside Hanging in a Seaside Restaurant 1
Is Public Wi-Fi Safe and What Can You Do to Use Public Wi-Fi Safely?

So a business is offering free Wi-Fi? Great! But you probably shouldn't use it. At least, not without protection.

Image of Sign-In Screen on Laptop 1
What Is Phishing-Resistant MFA and How Can You Implement It?

Multi-factor authentication makes your accounts more difficult to hack, but phishing gets around that. What can you do to make phishing ineffective?

An Image of Smarphone Shoiwng a Padlock 1
Bitwarden's Secure Notes: How to Safely Store Private Information

Bitwarden isn't limited to managing passwords. The service provides a safe way to store all kinds of sensitive information.

A Man Working on a Laptop With Headphone on Representing a Hacker 1
What Is Callback Phishing and How Can You Protect Against It?

A callback phishing email isn't actually dangerous. It's how you respond that leaves you vulnerable.

1 2
Page 1 / 2