Featured Blogs
8 Ways to Secure Your Family’s Online Holiday Shopping
It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance...
80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals
With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it. The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.
80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety
Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you using this strange...
80% of IoT Apps Not Tested for Security Vulnerabilities, Study Says
We use mobile applications every day, and typically, multiple times throughout the day. They’ve become part of the way we...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
9 Tips to Help Kids Avoid Popular App Scams
There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number...
A ‘Second Economy’ Prognosis for Health Care Cybersecurity
McAfee CTO Steve Grobman has pointed out that gaining the upper hand in cybersecurity requires that we extend our thinking...
A Billion Users Affected by Latest Yahoo Breach
Yahoo Inc. just revealed its second major breach in a year. Its first disclosure, taking place in September, claimed that...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...