Featured Blogs
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
“Grand Theft Auto V” Hack: How to Defeat the Online Gaming Bug
Over the past two decades, we’ve seen a huge rise in the popularity of online gaming among both children and...
How to Squash the Android/TimpDoor SMiShing Scam
As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams...
Android/TimpDoor Turns Mobile Devices Into Hidden Proxies
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
Have You Talked to Your Kids About a Career in Cybersecurity?
Here’s some cool trivia for you: What profession currently has a zero-percent unemployment rate, pays an average of $116,000 a...