Featured Blogs
6 Cybersecurity Predictions for 2024 – Staying Ahead of the Latest Hacks and Attacks
AI and major elections, deepfakes and the Olympics — they all feature prominently in our cybersecurity predictions for 2024. That’s...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...
How to Protect Yourself from QR Code Scams
Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
How to Raise Responsible Digital Citizens
‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...
How to Protect Your Kids From Inappropriate Online Content
Inquisitive, curious and fiercely independent. These are the three words that come to mind when I remember my boys as...
Deepfake Defense: Your 8-Step Shield Against Digital Deceit
A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users...
Safer AI: Four Questions Shaping Our Digital Future
Depending on the day’s most popular headlines, AI is either a panacea or the ultimate harbinger of doom. We could...
What Is Credential Phishing?
You guard the keys to your home closely, right? They have their own special spot in your bag or in...
User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too
In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...