Featured Blogs
Vulnerable From Below: Attacking Hypervisors Using Firmware And Hardware
Malicious attacks with firmware privileges can compromise an entire system, so it is especially important to apply measures to reduce...
#HDM: Decoding the Latest Wave of Teen Cyber Slang
Do you get a little confused looking through your teen’s Instagram or Twitter feed lately and seeing a crazy amount...
Passwords in Real Life: Don’t be Lazy
It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra...
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...
Forgot Where You Were Yesterday? Google Has You Covered.
Last Tuesday, Google introduced Your Timeline for its Google Map website and Android devices. Your Timeline acts as a documentarian...
Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can confide in fully....
Remote Jeep Hacking Successful: Time to Patch Your Car?
This blog post was written by Bruce Snell. Next month I’ll be moving back to the US after a few...
No Wi-Fi? No Problem. Teens Use New App to ‘Air Chat’
“Hey! Who shut off the data?” Is this a familiar question in your house? Teens who panic when their data...
Research Shows Parents Need a Pat On the Back But There Is Still Work To Be Done
Sometimes as parents we need a little pat on the back and confirmation we’re doing something right. Well, the McAfee...