Featured Blogs
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts...
The Busy Parents’ Guide to Keeping Your Kids Safe Online
As a busy mum of 4, I often feel that my brain is in overload. Too much information – not...
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
There’s nothing like that stressful moment when you look to your phone and see a red battery and a low...
6 Things to Monitor on Your Teen’s Instagram
Instagram is awesome — so awesome, in fact, it ranks in the top two social networks among teens. (Snapchat is...
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were...
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week...
Cryptocurrencies a Target for Cybercriminals, Part 1: the Risks of Innovation
All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it...
Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware
As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage...
Are Your Kids Into These 5 Unwanted Trends On Social Media?
Yesterday I picked up a friend’s child, who was returning from the week long class trip to Mumbai. As I...