Featured Blogs
Chapter Preview: Ages 2 to 10 – The Formative Years
As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Chat Friend Finder Apps on Google Play Leak Personal Information
Somewhat controversial websites or apps called chat friend finders, or ID BBS (Bulletin Board System) are spreading widely in Japan....
ChatGPT’s Impact on Privacy and How to Protect Yourself
How To Manage Your Privacy When Using ChatGPT or Other Generative AI Love it or hate it, generative artificial intelligence...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by...
Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in...
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...
Check Out the McAfee Most Dangerous Celebrity 2020
Attention Streamers: Check Out the McAfee Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet...
Check up on Your Virtual Safety: Tips for Telehealth Protection
Check up on Your Virtual Safety: Tips for Telehealth Protection In a poll conducted by the Canadian Medical Association, nearly...
Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well....
Chinese Cybercriminals Develop Lucrative Hacking Services
Underground cybercrime profits in China have likely already exceeded US$15.1 billion (100 billion Chinese yuan); caused more than $13.8 billion...
Chinese Trojan Hooks Macs, iPhones
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...
Chip and PIN Credit Cards: More Secure, But Not Perfect
Not too long ago I discussed a big change coming to your credit and debit cards—the Chip and PIN system....
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...