Featured Blogs
Dopple-ganging up on Facial Recognition Systems
Co-authored with Jesse Chick, OSU Senior and Former McAfee Intern, Primary Researcher. Special thanks to Dr. Catherine Huang, McAfee Advanced...
How Safe Is Your Android PIN Code?
Your Android PIN code is a critical aspect that protects your phone data from unauthorized access. But how safe is this four-digit code? This article aims to demystify this question and offers a comprehensive guide on the safety of Android PIN codes.
Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone
While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...
4 Mobile Malware Threats You Can’t Even See
By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population, this connectedness...
Mobile Spyware: How Hackers Hijack Phones Through App Spyware
Hackers don’t always break in, they ask for permission. Learn how mobile spyware hide in seemingly harmless apps and what you can do to stop them.
Why Should I Pay for Online Protection?
We all love free stuff. (Costco samples, anyone?) However, when it comes to your family’s security, do free online protection tools offer the coverage...
What Should I do If My Phone Gets Stolen or Lost?
Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation...
