Featured Blogs
14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users...
Analyzing and Identifying Issues with the Microsoft Patch for CVE-2018-8423
Introduction As of July 2019, Microsoft has fixed around 43 bugs in the Jet Database Engine. McAfee has reported a...
7 Questions to Ask Your Child’s School About Cybersecurity Protocols
Just a few weeks into the new school year and, already, reports of malicious cyberattacks in schools have hit the...
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
Introduction to “Is Your Digital Front Door Unlocked?” a book by Gary Davis
“Is Your Digital Front Door Unlocked?” explores the modern implications of our human nature: our inherent inclination to share our...
iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks
iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently...
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come...
3 Things You [Probably] Do Online Every Day that Jeopardize Your Family’s Privacy
Even though most of us are aware of the potential risks, we continue to journal and archive our daily lives...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open
Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images, as...
5 Hidden Hashtag Risks Every Parent Needs Know
Adding hashtags to a social post has become second nature. In fact, it’s so common, few of us stop to...
“Hackable?” Puts Wireless Mice to the Test
Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried...
Attention YouTubers: Protect Your Account From Being Hacked
Did you know that YouTube has 23 million content creators worldwide? Well, it turns out that many of these video...
5 Digitally-Rich Terms to Define, Discuss with Your Kids
Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself...
McAfee Receives the 2019 Security Excellence Award From IoT Evolution
If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us
Episode 1: What the Code Tells Us McAfee’s Advanced Threat Research team (ATR) observed a new ransomware family in the...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars
Episode 2: The All-Stars Analyzing Affiliate Structures in Ransomware-as-a-Service Campaigns This is the second installment of the McAfee Advanced Threat...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
Is Your Browser Haunted With Ghostcat Malware?
October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...
Device & App Safety Guide for Families
While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...
Stay Smart Online Week 2019
Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are...