Featured Blogs
What Do Social Media Companies Know About You?
What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Could (Pokémon) Go Wrong?
This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
What Are the Risks of Clicking on Malicious Links?
Learn how to spot risky URLs, what to do if you've clicked a phishing link, and essential steps to secure your device and accounts from malware, scams, and identity theft.
What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five...
What Are the 6 Types of Identity Theft
You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...
What Are Serverless Apps?
The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...
