Featured Blogs
Why You Need to Get a Family Technology Agreement Happening
There were multiple times during my digital parenting journey when I would have loved to put my head in the...
Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has...
Why You Need to Teach Your Kids to be Careful What They Search For Online
With information and video access at their fingertips most teens spend a crazy amount of time online looking for the...
Why You Need to Watch Out When Using Public Wi-Fi
If you’re like most people, you like to stay connected whether you are traveling or just on the go. That’s...
Why You Should Care About Fitness Tracker Security
Congratulations! You reached 10,000 steps today! It’s a great feeling when a wearable fitness device vibrates to let you know...
Why You Should Think Before Geotagging that Selfie
Do you remember the first time you posted on social media? Maybe it was a blog on LiveJournal or an...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
Why You Still Get Spam Calls Even After Blocking Numbers
You block a caller, feel a moment of relief, and then the phone rings again. If you’re wondering why you still get spam calls even...
Why Your Kids Can’t Join Facebook Until They Are 13
Have you ever wondered why it is that your kids can’t join social media sites like Facebook until they are...
Why You’re Going to Have to Start Filtering Your Calendar Invitations
Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured “amazing savings” and discounts...
Why “Strong Passwords” Aren’t Enough Anymore—and What to Do Instead
Imagine a day where you didn’t have to juggle passwords. No more sticky notes. No more notebooks with dozens of...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane...
Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was...
Windows 10 Makes a Strong Move Towards a Security Conscious Future
The past week has been an exciting one for cyber security announcements. On Tuesday, President Obama gave his State of...
Wired and Tired: 6 Simple Ways to Restore the Things Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers looked to me...
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
