Featured Blogs
Product Coverage and Mitigation for CVE-2014-1776 (Microsoft Internet Explorer)
On April 26, Microsoft released Security Advisory 2963983 for Microsoft Internet Explorer. In-the-wild exploitation of this vulnerability has been observed...
Product Coverage and Mitigation for CVE-2014-1761 (Microsoft Word)
On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across...
Process Reimaging: A Cybercrook’s New Disguise for Malware
As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even...
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...
Privacy in Practice: Securing Your Data in 2023 and Beyond
Every year we can count on new technology to make our lives easier. Right? As beneficial and convenient as tech...
Privacy in Practice: Securing Your Data in 2021 and Beyond
Technological advancements continually emerge that make our lives easier. Right? As beneficial and convenient as emerging tech is, it can...
Privacy Awareness Week-Are We Responsible for Our Data Breach?
“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...
Privacy Awareness Week 2019 – Protect Your Online Privacy
If you haven’t given your online privacy much attention lately then things need to change. In our era of weekly...
Privacy Awareness Week 2017: It’s Time To Talk More To Your Kids
Attention, parents with kids between 8 and 17! Here’s a statistic that is probably going to make you squirm –...
Prioritizing Security in a Remote Learning Environment
Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions...
Price Book Changes for 2014
Our Price Books have been complicated and difficult to use. So as part of our continuing effort to be easier...
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns. People like it...
Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store....
POS Malware Uses Time-Stamp Check to Evade Detection
This blog post was written by Kumaraguru Velmurugan. Point of sale (POS) attacks appear to have gained in popularity during...
Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day,...
Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent...
Pokémon Go: How Families Can Stay Safe (and Still Catch ‘Em All)
Thanks to the new augmented reality game Pokémon Go, app fans across the globe are enjoying countless hours of fun...