Featured Blogs
The Latest Pawn in the Warranty Fraud Game? Fitbit Users
With great technology comes great responsibility. This is particularly true when it comes to protecting technology. And with more and...
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
The Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology....
The Kids are in Charge
By Ribu, Communications Manager Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children...
The Kaspersky Software Ban—What You Need to Know to Stay Safe Online
Citing national security concerns, the U.S. Department of Commerce has issued a ban on the sale of all Kaspersky online...
The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you...
The iPhone’s Biggest Weakness May Be Your Computer
Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately,...
The iOS Twitter Bug: 3 Tips to Protect Your Location Data
Many of us use social media to keep our family and friends up-to-date on our everyday lives. We don’t typically...
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
The Internet is for Everyone to Enjoy—We’re Helping See to It
The internet is meant for all to enjoy. And that’s who we’re looking out for—you and everyone who wants to enjoy life online. We believe it’s important that...
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a desirable target for...
The Importance of Security Awareness in Our Connected Lifestyle
Not very long ago, people could be seen walking around waving their mobile phones in the air, looking for a...
The importance of cyber self-defense education
This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear; there is still...
The Hollywood Sign is Not on Fire: Deepfakes Spread During L.A. Wildfires
Amid the devastation of the Los Angeles County wildfires – scorching an area twice the size of Manhattan – McAfee...
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we...
The Hidden Costs of Cyber Attacks
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
The GPS Rollover Bug: 3 Tips to Help You Avoid Phishing Scams
Today, users are extremely reliant on our GPS devices. In fact, we’re so reliant on these devices that map features...