Featured Blogs
Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was...
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
Why “Strong Passwords” Aren’t Enough Anymore—and What to Do Instead
Imagine a day where you didn’t have to juggle passwords. No more sticky notes. No more notebooks with dozens of...
Why You’re Going to Have to Start Filtering Your Calendar Invitations
Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured “amazing savings” and discounts...
Why Your Kids Can’t Join Facebook Until They Are 13
Have you ever wondered why it is that your kids can’t join social media sites like Facebook until they are...
Why You Still Get Spam Calls Even After Blocking Numbers
You block a caller, feel a moment of relief, and then the phone rings again. If you’re wondering why you still get spam calls even...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
