Featured Blogs
Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security
L is for the way you look at your technology, O is for you’re not the only one looking at...
Are Virtual Machines the New Gold for Cyber Criminals?
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale...
Are third party apps for you?
“What are third party apps?” asked my mother with a frown. “Wow Gran! You are becoming pretty cyber-savvy!” commented my...
Are These ‘Most Hackable Gifts’ on Your Family’s Holiday List?
You’re the bomb, mom. You’re totally lit, dad. You managed to figure out a way to get Junior or Little...
Are Some Phone Charging Cables Dangerous to Plug in?
We’ve all felt helpless as our phone’s battery dwindles in a moment of dire need. 25%…15%… 5%. The panic sets...
Are Smart TVs too smart for their own good?
Smart TVs give viewers instant access to streaming apps and provide a never-ending supply of binge-worthy shows and movies. But...
Are Smart Padlocks Secure Enough to Protect Your Packages?
“Hackable?” host Geoff Siskind likes to shop online. A lot. What he doesn’t like is how often his packages are...
Are Mobile Devices Less Secure than PCs?
Are smartphones less secure than PCs? The answer to that is, they’re different. They face different security threats. Yet they...
Are Google and Bing Serving You Safe Search Results?
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites...
Are Fake Apps Taking Over Your Phone?
It seems some malicious app developers have taken the phrase “fake it ‘til you make it” to heart, as fake...
Are Embedded OEM Device Manufacturers Responsible for Device Security?
The blog was written by Tom Moore. Threats against the Industries Today’s devices are becoming more internet-connected as we speak....
Are Connected Homes Mirai’s New Best Friend?
Whenever someone wonders why a strong password is so important, there’s one thing you can remind them of: Dyn. Ring...
Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...
Are All Hackers Bad?
The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s...
Apps Tracking Your Location: Friendly or Creepy?
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring...
Apps to Stop You (Adults!) from Texting and Driving
She was texting and driving when she hit my kid. No, it wasn’t a careless teenager or a group of...
Apps Sending Plain HTTP Put Personal Data at Risk
At the AVAR Conference in November 2014, McAfee Labs presented how to exploit a cross-site scripting vulnerability of the Costco...
Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses
Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...
Apple, SSL, and the Importance of Updating Your Software
Before we begin: please take a minute to update all of your iOS devices to the latest iOS version, iOS...
Apple Users: This macOS Malware Could Be Spying on You
In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth...
Apple Users: Here’s What to Do About the Major FaceTime Bug
FaceTime is a popular way for people of all ages to connect with long-distance loved ones. The feature permits Apple...
Apple iOS Attack Underscores Importance of Threat Research
The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected,...
Appearances Can Be Deceiving: Fake Anti-Virus App Dupes Users
If the laws of nature are capable of teaching us one thing it’s this: if it seems too good to...
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...
App Lock: The Security System for Unprotected Mobile Apps
Lock: To fasten, to make secure, to confine or exclude by. To fix in place so that movement or escape...
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no longer takes a...
App Alert: What Parents Need to Know about Popular New App ‘Yellow’
Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little...