Featured Blogs
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a...
Leaning into Change with the McAfee Family
With today’s current climate, many companies are building cultures and infrastructures to support working from home (WFH). Like most transitions,...
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is...
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed, they give hackers...
Learn to Identify and Avoid Malicious Browser Extensions
Browser extensions have become essential parts of how we browse, bank, work, and shop online. From password managers to ad...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Less Is More: Why One Antivirus Software Is All You Need
Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect...
Lessons Learned: A Decade of Digital Parenting
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow...
