Featured Blogs
Little Ones Online More? Here Are 10 Basics To Keep Them Safe
Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers...
Linux Kernel Vulnerability Can Lead to Privilege Escalation: Analyzing CVE-2017-1000112
This blog was written by Krishs Patil. A memory corruption bug in UDP fragmentation offload (UFO) code inside the Linux...
Like This Post – And Get Hacked
Admit it. Social media has made your world a little smaller—and it’s all in the palm of your hands. Our...
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study
How do parents and children connect and protect themselves online? We spoke with thousands of them around the world to...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...
Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
