Featured Blogs
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’
As adults, we know the importance of strong passwords, and we’ve likely preached the message to our kids. But let’s...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Here’s a Codicil to Add to Your Will – Disposal of Your Digital Assets
Codicil to Add to your Will – Disposal of Your Digital Assets We were still in shock over the sudden...
McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs
*This blog is originally from August 2018 and was updated April 2019* From connected baby monitors to smart speakers —...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...