Featured Blogs
3 Things You Need to Know About Summer Cybersecurity
The summer season is quickly approaching. Users will take to the skies, roads, and oceans to travel throughout the world...
Don’t Let Airbnb Scams Stop Your Summer Travel Plans
With summertime just around the corner, many people are planning vacations to enjoy some much-needed R&R or quality time with...
Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement
A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are...
RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP)....
“Hackable?” Puts Smartphones to the Test
Is the Personal Data on Your Smartphone Vulnerable? Listen to Find Out: Used for everything from banking and taking pictures,...
Breaches and Bugs: How Secure are Your Family’s Favorite Apps?
Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...
3 Tips for Protecting Against the New WhatsApp Bug
Messaging apps are a common form of digital communication these days, with Facebook’s WhatsApp being one of the most popular...
The iOS Twitter Bug: 3 Tips to Protect Your Location Data
Many of us use social media to keep our family and friends up-to-date on our everyday lives. We don’t typically...
Privacy Awareness Week 2019 – Protect Your Online Privacy
If you haven’t given your online privacy much attention lately then things need to change. In our era of weekly...
On Mother’s Day, Show Your Love for Your Mom by Introducing Her to Helpful Apps
A mobile chat with my mother usually goes off like this: “Hello! Can you hear me! I am very busy...
Saving Summer: 5 Strategies to Help Reign In Family Screen Time Over Break
It’s the most wonderful time of the year — for teachers and lifeguards. For everyone else (parents) we have a...
Avoid a Security Endgame: Learn About the Latest “Avengers” Scam
Marvel Studio’s $2.2 billion box-office hit “Avengers: Endgame” has quickly risen to the second-highest grossing film of all time in...
#Verified — Worth the Risk?
In the social media world, a little blue checkmark next to a username is a sought-after status symbol. Celebrities, global...
What Would Yoda Do? 5 Tips to Raising a Mindful Digital Jedi
A Jedi, from the epic Star Wars films, is a warrior who fights for the greater good. Jedi are set...
What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation
Gary Davis is now a regular contributor on the Tech Nation podcast! In this episode, Gary Davis educates that phishing...
Protect Your Digital Life: Why Strong Passwords Matter
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was...
It’s World Password Day – Give your Passwords an Overhaul!
How much of your personal data is stored online? Well, if you are anything like the ‘average Jo’ – the...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’
As adults, we know the importance of strong passwords, and we’ve likely preached the message to our kids. But let’s...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Here’s a Codicil to Add to Your Will – Disposal of Your Digital Assets
Codicil to Add to your Will – Disposal of Your Digital Assets We were still in shock over the sudden...
McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs
*This blog is originally from August 2018 and was updated April 2019* From connected baby monitors to smart speakers —...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...