Featured Blogs
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.
User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too
In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...
Use an Airport App to Catch a Flight, Not a Bug
Traveling is supposed to be a break from reality, but that doesn’t mean it’s a breeze. First your Uber driver...
USB Drives – With Convenience Comes Risk
I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are...
USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
US-B Careful: Public iPhone Chargers Lie in Wait
It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?
Urgent! Update Your Apple Devices Now
This blog was written by Bruce Snell. A number of serious vulnerabilities have been recently reported impacting OS X, iOS,...
Updates and Mitigation to Microsoft Office Zero-Day Threat (CVE-2013-3906)
On November 5, Microsoft posted Security Advisory 2896666. This vulnerability, discovered by Haifei Li of McAfee Labs, affects multiple versions of Microsoft...
Updated BlackEnergy Trojan Grows More Powerful
In late December, a cyberattack caused a power outage in the Ukraine, plunging hundreds of thousands of citizens into darkness...