Featured Blogs
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From...
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
3 Tips to a Holistic Online Security Approach
Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your...
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
How to Safely Incorporate IoT Into Your Fitness Routine
Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic,...
CRN’s Women of the Channel 2021 Recognizes McAfee Leaders
Every year CRN recognizes the women who are leading the channel and their unique strengths, vision, and achievements. This year, CRN recognized five McAfee...
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...
Elevate Your Financial Security: How to Safely Bank Online
Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make...
Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...