Featured Blogs
Linux Kernel Vulnerability Can Lead to Privilege Escalation: Analyzing CVE-2017-1000112
This blog was written by Krishs Patil. A memory corruption bug in UDP fragmentation offload (UFO) code inside the Linux...
Little Ones Online More? Here Are 10 Basics To Keep Them Safe
Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers...
Live Streaming – The Good, The Bad & The Ugly
Listen up parents: live streaming is the latest trend that you need to get your heads around. Not only are...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Location Apps: Who’s Tracking Your Kids?
Last week we talked about the dangers that can arise with apps that allow anonymous users to interact. Equally concerning...
Location, Location, Location: Three Reasons It Matters for Your Smartphone
With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation...
Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago,...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively...
