Featured Blogs
123456 Is Not an Acceptable Password
A common misconception is that a password only needs to be memorable. Whilst this is a helpful trait, it does a disservice to the importance of having a secure series of characters. This guide will walk you through why "123456" is not an acceptable password.
How to Protect Your Mobile Device From Loss and Theft
The unfortunate reality of our digital era is that devices are lost, misplaced, or stolen every day. A mobile device without password protection is a gold mine for anyone with malicious intent.
How much do you count on the internet every day?
Maybe you do armloads of shopping on it. Maybe you skip going to the bank because you can tackle the...
How to Win the Battle Against Deepfakes and Malware
As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked—AI also works on your side. It...
Cryptojacking – Stop Hackers from Making Money Off You
Your pain is their gain. That’s how things go in a cryptojacking attack. Cryptomining is the utilization of computers to...
Digital Strategies to Safeguard Your Child from Upsetting and Violent Content Online
Amidst the recent heartbreaking events in the Middle East, parents now face the challenge of protecting children from the overwhelming...
How to Look Out For Scams on Facebook Marketplace
Reels of another kind rack up the views online. Stories about Facebook Marketplace scams. Recently, TikTok’er Michel Janse (@michel.c.janse) got...
McAfee 2023 Hacker Celebrity Hot List – Why Hackers Love Ryan Gosling so Much
Hackers love Ryan Gosling. In fact, hackers use his name as bait more than any other celebrity. With that, the...
Advances in Our Use of AI Keep You Even Safer Online
AI is on your side. In fact, it’s kept you safer online for some time now. Now that scammers and...
’Tis the Season for Holiday Scams: 5 Common Schemes to Look Out For
This time of year, the air gets chillier and a bit cheerier for everyone … including online scammers. Holiday scams...
The Benefits of Protection – The Case for Digital Wellness in the Workplace
This is the first in a series of three articles covering digital wellness programs in the workplace. Here we take...
Unmasking AsyncRAT New Infection Chain
Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...
What Are the Risks of Clicking on Malicious Links?
A simple click of a link can’t cause any trouble, right? Wrong. It doesn’t matter if you quickly close out...
The Benefits of Protection – Why Employees Place a High Value on Digital Wellness
In workplaces around the world, employees agree — they feel strongly about online protection. Our joint research with Statista puts...
Scam Texts Are More Painful Than Getting a Root Canal
Sick and tired of scam messages? So are the 54% of Americans who said they’d rather get a root canal...
Fake Android and iOS apps steal SMS and contacts in South Korea
Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...
The Benefits of Protection – How Organizations Gain from Digital Wellness
This is the final in a series of three articles covering digital wellness programs in the workplace. Here we explore...
How to Protect Kids From Harmful Online Content
November 20 is World Children’s Day, a day that celebrates “international togetherness, awareness among children worldwide, and improving children’s welfare.”...
Sextortion – What Every Parent Needs To Know
Imagine this. You’re 15, feeling unsure about yourself in the world, possibly even a little lonely. One day, a pretty...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...
How to Shop Safely This Holiday Season
Yes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the...
How to Help Your Teens Stay Safe When They Start Dating Online
In the 80’s, train stations and church groups were the key places to meet boys. And despite the fact I...
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...
Is That Delivery Text Real or Fake? How to Shop and Ship Safely this Season
With the rush of Black Friday and Cyber Monday shopping comes a rush of another kind. Millions of fake delivery...
Do I Really Need to be on Snapchat to be a Good Digital Parent?
If you had to count the number of social media platforms your teen uses, I wonder what the score would...
User Data from 23andMe Leaked Online – What Users Should Do, and the Rest of Us Too
In October, a hacker claimed to have hijacked profile information of “millions” of users from the popular genetic testing site...
What Is Credential Phishing?
You guard the keys to your home closely, right? They have their own special spot in your bag or in...