Featured Blogs
What Does “Connection is Not Private” Mean?
Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...
What Does Your Password Say About Your Preferences?
Passwords say a lot about us. They speak to what we prioritize, what we hold dear. So when I recently saw my wife’s password included...
What Does It Take To Be Digitally Secure?
Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...
What Do Your Kids Want To Be When They Grow Up?
When I was 8, I was completely obsessed with being an air hostess ‘when I grew up.’ The thought of travelling the...
What Do Social Media Companies Know About You?
What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Could (Pokémon) Go Wrong?
This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...