Featured Blogs
What is Malware?
What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware”...
Mobile NFC Features Raise Security Concerns
Yesterday, at the Web 2.0 Summit, Google’s CEO Eric Schmidt presented the Nexus S. This wasn’t just about a new...
Android Malware Spreads Through QR Code
Last week, there was quite a buzz in the mobile-malware researchers community about a new Android malware. It came to...
Networked Printers at Risk
Multifunction printers (MFPs) have been common in offices for years. They let employees print, scan, and copy documents. Two separate talks...
2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online
From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day. It’s very...
‘FakeInstaller’ Leads the Attack on Android Phones
Android.FakeInstaller is a widespread mobile malware family. It has spoofed the Olympic Games Results App, Skype, Flash Player, Opera and...
10 Tips to Safe Online Shopping
How times have changed. I can remember when Christmas didn’t start until after Thanksgiving—not before Halloween as we see things...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Are you Hackable or Uncrackable? “Password Day” is Today!
Yes, such a day exists and it’s today, May 7th 2013. McAfee is working to make sure consumers increase their...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
To Skype or Not to Skype: What Parents Need to Know About Video Chat
Captain Kirk isn’t the only one who gets to video chat these days. If your kids have a smart phone...
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
Taking Your Teen’s Phone: Know the Pros and Cons
Many parents shudder at the thought. Some even experience a shortness or breath and heart palpitations when they imagine what...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
7 Things Parents Need to Know About the Voxer Voice App
Every five minutes, it seems, a new app comes out but only a handful stick with tweens and teens looking...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...