The Dangers of Walking and Talking
As safe drivers and responsible community members, I know we are all aware that you just can’t use your mobile...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
Research Shows Parents Need a Pat On the Back But There Is Still Work To Be Done
Sometimes as parents we need a little pat on the back and confirmation we’re doing something right. Well, the McAfee...
Social Media Swamped by Social Botnets
As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years....
Bringing Up the Next Generation of Digital Citizens
Nearly every automobile driver has some understanding of the ‘rules of the road,’ from using your seatbelt to signaling before...
Verizon Report Foreshadows Breaches Originating With IoT Devices
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon...
What is a Virus?
Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses,...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
How Password Managers are Saving the Day
As I get older, I am convinced that my memory is fading. Whether it’s names, places or even passwords, my...
To Preserve Bandwidth, Gogo Inflight Executes a Man-in-the-Middle Attack
Early last week, Gogo Inflight, a provider of in-flight Internet access for airlines, caught a lot of headlines for a...