Featured Blogs
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware. Cerber encrypts files...
Cerber Ransomware Now Hunts for Databases
Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
CES 2021: Highlights From the “Cleanest” Show Yet!
Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However,...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
Change Your Password. World Password Day is 7 May!
We also say we want to be safe online. Yet sometimes our actions betray our words—especially if we’re using simple,...
Changing Passwords in a Post Heartbleed Bug World
From a home security standpoint, the main gatekeeper is the house key. It’s small, portable and fairly adept at keeping...
Chapter Preview: Ages 11 to 17 – From Tweens to Teens
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”...
Chapter Preview: Ages 2 to 10 – The Formative Years
As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...
