Featured Blogs
How I Seized McAfee’s Opportunities to Realize My Potential
This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...
How I Live Safe: 3 Tips for Staying Secure Online
As a security professional, online safety is always on my mind. Especially when I’m using my personal devices, rather than...
How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles
In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
How Hackers are Using Heartbleed to Trick You into Infecting Your Computer
Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It...
How Googling Our Favourite Celebrities Is A Risky Business
Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...
How Free VPNs Come With a Price
The number of people who use VPNs (virtual private networks) continues to mushroom. Recent research shows that 46% of American...
How Fraudsters Are Fooling Users With This Proof of Vaccination Phishing Scam
You open your laptop and see an email from a healthcare organization that you don’t recognize. The subject line reads “URGENT –...
How Extremist Groups Target Teens Online
With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.
How Entertaining Ourselves at Home Has Become a Risky Business
Online entertainment is certainly having a moment. While we all stayed home and socially distanced, many of us filled our...
How Does Jailbreaking Or Rooting Affect My Mobile Device Security?
In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
How Do You Manage Your Social Media Privacy?
‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit...
How Do You #PressForProgress?
By Marty, Regional Sales Director March 8th marks the 108th year the world has celebrated International Women’s Day. During those...
How Do I Protect Myself When Using Wi-Fi?
How do you protect yourself when you use public Wi-Fi on your phone? For the 40% of people who say...
How Do I Live Safe?
This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter. We thought it would...
How Do Hackers Hack Phones and How Can I Prevent It?
The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. ...
How Data Brokers Sell Your Identity
Data Privacy Week is here, and there’s no better time to shine a spotlight on one of the biggest players...
How Cybercriminals Are Shopping for Personal Data This Black Friday
While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...
How Cyberbullying Looks In Australia in 2023
There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...
How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family
Like stockbrokers watch the market, cybercriminals keep an eye on the public’s latest obsessions. And, once they spot a trend...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
How Can We Stop ‘ROP’ Cyberattacks?
IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant...
How an Online Prank Had Countless Phones Dialing 911
Remember elementary school, when prank notes left on fellow students’ desks caused uproars of laughter? Those were golden days....
How AI PCs Are Optimizing Productivity Tools for Students
In today’s fast-paced educational environment, productivity is a key determinant of academic success. Enter AI PCs—computers enhanced with artificial intelligence...
How AI Deepfakes and Scams Are Changing the Way We Shop Online
As 89% of Americans plan to shop online during this holiday shopping season, many say they’re more concerned about being...