Featured Blogs
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...
3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy
Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives...
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come...
iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks
iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently...
Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis
“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
7 Questions to Ask Your Child’s School About Cybersecurity Protocols
Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the...
Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423
Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...
14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users...
Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial...
Ellen DeGeneres Instagram Hack: What You Can Do to Protect Your Account
Today was not an easy morning for Ellen DeGeneres. She woke to find that her Instagram account was briefly hacked...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Digital Parenting: How to Keep the Peace with Your Kids Online
Simply by downloading the right combination of apps, parents can now track their child’s location 24/7, monitor their same social...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...
How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year...
How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the...
Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win
It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end,...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
Dorms, Degrees, and Data Security: Prepare Your Devices for Back to School Season
With summer coming to a close, it’s almost time for back to school! Back to school season is an exciting...
McAfee AMSI Integration Protects Against Malicious Scripts
This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.
How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The...