Featured Blogs
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
Setting the Bar for Marketing Innovation – Evolving our Marketing Strategy in the Security Technology Industry
Every year we recognize partners for achieving excellence in a variety of categories. Last month at our Americas Partner Summit,...
Study: Want an Epic Family Vacation this Year? Unplug!
Everyone talks about it but, c’mon, who really completely unplugs from tech completely on vacation? According to a recent study...
Mobile Pop-Ups, Digital Spam with a Side of Dangerous
Technology has become the personal assistant of our dreams, but also the crutch for our brains that we’ve grown increasingly...
Oversharing – Don’t Blame It All On The Kids!
No matter which way you interpret the plethora of research, it is very clear – our teens are oversharing. The...
The Channel Transformation to Ascend
This blog was written by Richard Steranka. In our continued quest to become our customers’ #1 security vendor and our...
EMEA Channel Partner Summit: The highlights
This blog was written by David Small. As we look ahead to our annual FOCUS Security conference, a three day...
Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans...
New Campaign Kits: Elevate Your Marketing by Elevating Your Conversations
IT decision makers have spoken – good information is hard to find. According to IDG’s 2016 Customer Engagement Research, a...
Are You Safer Unplugging on Vacation?
This blog was written by Bruce Snell. You probably know by now that I love technology. I have either my...
Survey: More Than Half of Travelers Couldn’t Unplug on Vacation
Everybody knows it, everybody admits it, and everybody seems to accept it. We’re addicted to our mobile phones. While over-attachment...
JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...
A Family Technology Contract? Should You or Shouldn’t You?
I would never consider myself to be an A+ parent. Maybe a solid B. Perhaps I can blame the large...
Keep Your Guard Up: Sports Streaming Sites Yield Hidden Dangers
Just as every dog has its day, so too do sports. The NBA finals, the Playoffs, the Stanley Cup —...
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
Celebrating our partners across EMEA
This blog was written by David Small. Last week, our EMEA Channel Partner Summit took place in Mallorca. This year’s...
Risky Selfie Trend: Snapping and Driving
Just when you thought the dangerous selfie craze was winding down, there’s a whole new trend that poses a risk to drivers....
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
Facebook Messenger Flaw Could’ve Allowed Criminals to Intercept Messages
When it comes to day-to-day communications, we are—to put it mildly—married to our messaging applications. Which is why it’s worrying...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
Experts Discuss the 2016 Verizon DBIR: June #SecChat
Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...
How Safe Is Your Personal Information Online?
How many websites have you shared information with? Do you use the same passwords across all your accounts? Is your...
What Everyone Can Learn from The Mark Zuckerberg Hack
When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...
Does Your Teen Recognize the Cruelty of Subtweeting?
“No way! Do you think this tweet is about me?” The abruptly frantic teen held her phone directly up in...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...