New Year, New You: Start Fresh With McAfee Protection Score
Are you an online oversharer? Do you give your full birthday to all your online shopping accounts? Have a few companies you have accounts with been breached but you didn’t take any action at the time? If you have bad digital habits, now is an excellent time to reset your digital presence. In isolation, these […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day upon us, it’s time to have “The Talk.” The internet talk, that is. What’s the internet talk? It’s a candid conversation about how safe we’re really being when we go online, as opposed to how […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to […] more…What’s New in the World of Ransomware?
Ransomware, the type of malware that can infect your computers and devices, lock you out of your own files, and demand a ransom to unlock them, is growing rapidly in both incidents and sophistication. In some cases, ransomware is even used as a cover to distract from more serious attacks, so it’s important for everyone […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…How Do I Keep My Kids Safe On iPhone?
A friend had recently been on a trip to Singapore and among the many purchases she made was her dream phone, the gleaming black temptress, the iPhone! From the time of their return, however, she hardly gets to use her iPhone or gloat over her new acquisition. The reason is her two middle-school going kids- […] more…More information
- MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats
- CISA Warns Enterprises of Risks Associated With Tor
- Inside the British military base where young hackers learn to stop cybercrime
- US Senate passes anti-robocalling bill
- Researcher finds critical vulnerabilities in Sophos antivirus product
- How MIT ensnared a hacker, bucking a freewheeling culture
- Snakes on a plane! (Stuffed inside a hard drive)
- 2/2/17 Data Center Network IPv6 Router Advertisements To Be Disabled
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability