Featured Blogs
Microsoft Agrees: Home Users Need More than Antivirus Alone
After years of telling users that Microsoft Security Essentials was enough to protect their PCs from security threats, Microsoft has...
Messenger Rooms: New Video Chat Option is Fun But Has Risks
One of the many things we’ve learned during this season of being homebound is that video chats with friends can...
Meltdown and Spectre Aren’t Done Just Yet – New Malware Uses Exploits to Attack Browsers
We kicked off 2018 with two powerful new exploits: Meltdown and Spectre. And since the discovery of Meltdown and Spectre...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in 2017. Now, 2018...
Meet McAfee WebAdvisor’s New Cryptojacking Blocker
totalBy now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply,...
Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes
If there’s one reason why classic James Bond films are so widely enjoyed, it’s because of the unbeatable gadgets. From...
Meet IoT_reaper: The New Malware Building a Massive Botnet Army
WannaCry, Petya, the Dyn distributed denial-of-service (DDoS) attack – all now infamous cyberattacks that have defined the modern threat landscape....
Meet ‘Tox’: Ransomware for the Rest of Us
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover...
Medical IoT Manufacturers Given Guidelines on Lifelong Devices Security, Courtesy of FDA
2016 appears to have one more gift for us before calling it a year, and this time it involves both...