Featured Blogs
10 Ways to Help Your Family Break Bad Tech Habits
A new study from Pew Research confirms our collective hunch that 95% of teens now report they have a smartphone...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
