Featured Blogs
How To Minimise the Fallout From a Data Breach
There used to be a saying that ‘nothing is certain except death and taxes’. Well, I now think it needs...
How to Navigate this Connected World
This blog was written in collaboration with Kishore Jotwani, Sr. Director of Marketing & Business Development for Intel’s Wireless Consumer Infrastructure...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
How to Prepare for Your Child’s First Smartphone
If only more things in life came with training wheels; a child’s first smartphone could certainly use some. Like taking off the training wheels...
How To Prevent Downloading Malicious Software
Malware—the term seems to be at the center of the news every day, with each headline telling of a new...
How to Prevent Keyboard Snooping Attacks on Video Calls
Video conferencing has really taken off this year. With more people working and learning from home than ever before, video...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
How to Protect Against New Types of Scams Like QR Phishing
Four in ten Americans say they use peer-to-peer payment services, like Venmo, PayPal, or Apple Pay, at least once a...
How to Protect Against OpenSSL 1.1.0a Vulnerability CVE-2016-6309
This blog post was written by Rock Liu. Recently the OpenSSL security library gained a fix for a critical security...
How to Protect Against Petya Ransomware in a McAfee Environment
A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft’s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.
How to Protect Against WannaCry Ransomware in a McAfee Environment
WannaCry is a ransomware family targeting Microsoft Windows. On Friday May 12, a large cyberattack based on this threat was launched. At this time, it is estimated that more than 250,000 computers in 150 countries have been infected, each demanding a ransom payment.
How to Protect Kids From Harmful Online Content
November 20 is World Children’s Day, a day that celebrates “international togetherness, awareness among children worldwide, and improving children’s welfare.”...
How to Protect School Children From Deep Fakes
Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....
How to Protect the Smart Devices in Your Home
Outfitting your smart home could get a whole lot easier this year. A new industry standard called Matter aims to...
How to Protect Three Common IoT Devices in 2019
It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will...
How To Protect Today’s Smart Home
We love our kids, and we want the best for them. In today’s connected world, the role of a parent...
How to Protect Your Child from Identity Theft in 8 Easy Steps
With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor...
