Featured Blogs
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
Connected or Compromised? How to Stay Secure While Using Push Notifications
You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Beware: Zombie IoT Botnets
The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...