Featured Blogs
Helping Your Family Combat Digital Misinformation
Helping Your Family Combat Digital Misinformation If 2020 has taught us anything, it’s that our ability to think critically about...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.
One Team Member Selflessly Provides Relief to COVID-19’s Front Line
By: Heiko, Senior Security Engineer, Germany I never could have imagined that what started as a national duty to volunteer...
Operation North Star: Behind The Scenes
Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...
Operation North Star: Summary Of Our Latest Analysis
McAfee’s Advanced Threat Research (ATR) today released research that uncovers previously undiscovered information on how Operation North Star evaluated its...
Why Does My Phone Get Hot?
Overheating is a common issue in mobile devices, but it often raises alarms among users. This concern is usually unnecessary, as there are several common and easily resolvable reasons why phones get hot. However, it is essential to cool down an excessively hot device promptly to prevent it from overheating ...
How Extremist Groups Target Teens Online
With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.
Top 5 Most Dangerous Email Subject Lines
In this article, we delve deeper into the tactic that is a favorite among cybercriminals – ‘phishing‘ via emails. We focus on the trickiest and most dangerous email subject lines that have been commonly used in worldwide phishing emails. Recognizing these ‘ baits’ can be your first step towards safeguarding ...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.