Featured Blogs
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...