Featured Blogs
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
How to Make Sure Spring Break Doesn’t Wreck Your Digital Rep
Spring Break 2019 is in full swing, which means high school and college kids have hit the road determined to...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...
Smart home safety tips
Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected...
McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day
By Karla, Digital Media Specialist During the month of March, we are thrilled to support International Women’s Day, on March...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
McAfee Protects Against Suspicious Email Attachments
Email remains a top vector for attackers. Over the years, defenses have evolved, and policy-based protections have become standard for...
