Featured Blogs
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Android Malware Spreads Through QR Code
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...
Networked Printers at Risk
Multifunction printers (MFPs) have been common in offices for years. They let employees print, scan, and copy documents. Two separate talks...
2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online
From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day. It’s very...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Are you Hackable or Uncrackable? “Password Day” is Today!
Yes, such a day exists and it’s today, May 7th 2013. McAfee is working to make sure consumers increase their...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
To Skype or Not to Skype: What Parents Need to Know About Video Chat
Captain Kirk isn’t the only one who gets to video chat these days. If your kids have a smart phone...
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
