Featured Blogs
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for...
Top Tips to Spot Tech Support Scams
There are number of ways scammers use to target your money or personal details. These scams include support sites for...
Top Tips For Securing Your Devices
By now most of us know how important it is to protect our computers and smartphones from malware and other...
Top Tips for Securing Home Cameras
Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...
Top Tips for Cybersecurity Awareness Month
Imagine this: you wake up one morning to find that your bank account has been emptied overnight. Someone halfway across...
Top Strategies For Keeping Your Kids Safe Online
What if I told you that the most important thing you need to keep your kids safe online doesn’t come...
Top Security Threats to Look Out for in 2021
Top Cyber Security Threats to Look Out for in 2021 2020 was unexpectedly defined by a global pandemic. Throughout the...
Top Online Scams & How To Avoid Them
If you’re like most people, going online is a natural part of your day and you don’t focus on the...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.
Top 5 Reasons To Participate in the McAfee Virtual Sales Kickoff
In 2013 we remain committed to investing in, growing with and optimizing for you, our channel partners. A prime example...
Top 5 Most Dangerous Email Subject Lines
In this article, we delve deeper into the tactic that is a favorite among cybercriminals – ‘phishing‘ via emails. We focus on the trickiest and most dangerous email subject lines that have been commonly used in worldwide phishing emails. Recognizing these ‘ baits’ can be your first step towards safeguarding ...
Top 3 Phishing Attacks Use Similar Tricks
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...
Top 10 Tips To Stay Safe Online
With hacks, scams, cybercriminals, malware and more, the internet can feel like a dangerous place these days. And, the recent...
Top 10 COVID-19 Scams: How to Stay Protected
The COVID-19 pandemic flipped the world on its head in so many ways. Offices and schools stood empty while living...
Too Much Tech: 4 Steps to Get Your Child to Chill on Excessive Snapchatting
We were in the midst of what I believed to be an important conversation. “Just a sec mom,” she said promptly...
Tom Hanks Warns Fans: The Dark Side of AI Scams
Tom Hanks, one of the most recognizable faces in the world, warns that scammers have swiped his likeness in malicious...