Featured Blogs
Check up on Your Virtual Safety: Tips for Telehealth Protection
Check up on Your Virtual Safety: Tips for Telehealth Protection In a poll conducted by the Canadian Medical Association, nearly...
Check Out the McAfee Most Dangerous Celebrity 2020
Attention Streamers: Check Out the McAfee Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet...
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...
Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by...
ChatGPT’s Impact on Privacy and How to Protect Yourself
How To Manage Your Privacy When Using ChatGPT or Other Generative AI Love it or hate it, generative artificial intelligence...
Chat Friend Finder Apps on Google Play Leak Personal Information
Somewhat controversial websites or apps called chat friend finders, or ID BBS (Bulletin Board System) are spreading widely in Japan....
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
Chapter Preview: Ages 2 to 10 – The Formative Years
As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...
Chapter Preview: Ages 11 to 17 – From Tweens to Teens
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”...
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly adept at keeping...
Change Your Password. World Password Day is 7 May!
We also say we want to be safe online. Yet sometimes our actions betray our words—especially if we’re using simple,...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
CES 2021: Highlights From the “Cleanest” Show Yet!
Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However,...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
Cerber Ransomware Now Hunts for Databases
Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is...
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
