Featured Blogs
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
Facebook Messenger Flaw Could’ve Allowed Criminals to Intercept Messages
When it comes to day-to-day communications, we are—to put it mildly—married to our messaging applications. Which is why it’s worrying...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
Experts Discuss the 2016 Verizon DBIR: June #SecChat
Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...
How Safe Is Your Personal Information Online?
How many websites have you shared information with? Do you use the same passwords across all your accounts? Is your...
What Everyone Can Learn from The Mark Zuckerberg Hack
When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...
Does Your Teen Recognize the Cruelty of Subtweeting?
“No way! Do you think this tweet is about me?” The abruptly frantic teen held her phone directly up in...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...