Featured Blogs
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies, such as social...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Your Phone Is the #1 Target in a New Wave of IRS Scams, McAfee Finds
As Tax Day looms and last-minute taxpayers feel the pressure, a surge of IRS scams is on the rise. Research...
Your Mobile Lucky Charm
Happy St. Patrick’s Day! While today was originally established to honor the life of St. Patrick, over time the holiday...
Your mobile apps could be spying on you and telling secrets!
I am sharing this article, written by Shelly Tzoumas – Thanks, Shelly! How close are relentless cyber criminals to hacking...
Your Kids Are My Problem, Here’s Why
This post was written by Jessica Brookes Snow falls outside the large steamy windows at a popular coffee shop in...
Your Identity Takes Flight With Angry Birds’ Data Sharing Policies
Back in the heyday before the Internet, and even before the telephone, there was one somewhat-reliable way of spreading information...
Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set...
Your Back To School Tech Plan
I am such a fan of school holidays! No music lessons, no sport, no commitments. Bliss!! The crazy school term...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
You, Your Company, and BYOD: A Love Triangle
BYOD, or bring your own device, has become the new normal in the corporate workplace. But with this convenience comes...
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
You Might Not Be a Celebrity, But You Could Still Get Hacked
In 2016, there’s a ‘who’s who’ of A-list celebrities. No, it’s not who was invited to the Academy Awards or...
You Could Get Prank Called (and Charged) By Your Own Phone
Most people would never think to prank call themselves. However, they may be allowing their smart phones to do just...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
YOLO: What Parents Need to Know About the Anonymity App Kids Use with Snapchat
If your kids use Snapchat, chances are they also use the popular new app YOLO along with it. Since it’s...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
Yahoo! Hacked: 15 Tips To Better Password Security
In light of the Yahoo Voices hack where 450,000 passwords have been compromised, it’s time again to let the world...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XcodeGhost Pulled from App Store After a Good Scare: What to Know
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
Wrong Number: Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates....
Would You Know How to Help Someone in Emotional Crisis Online?
The more connected we become through technology, the harder it may be to reach out to another person and ask...
Worried About App Permissions and Your Privacy? Check Out McAfee and Verizon’s App
Listen up, Android users! As Robert Siciliano mentioned in one of his recent blogs, the Android OS has become the...