Featured Blogs
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
Beware: Zombie IoT Botnets
The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Connected or Compromised? How to Stay Secure While Using Push Notifications
You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
McAfee Explorers: From Student to Teacher
Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end....
At What Age Should Kids Join Social Media?
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...
Triton Malware Spearheads Latest Attacks on Industrial Systems
Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to ...
What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...
Shop till You’re Hacked? 3 Tips to Stay Secure this Holiday Season
With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation...
Be the Child On Children’s Day – Build Better Bonds With Your Kids
November 14th is a day children in India keenly look forward to. Schools and neighbourhoods gear up to make the...
Why Traditional Database Security Doesn’t Protect Data
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers...
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Holiday Stress Can Make You More Careless Online
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only...
2018 Americas Partner Summit
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled...
