While it makes a great title, not ALL browser extensions are evil. In fact, most can be helpful. The problem is that each and every browser extension, no matter its intended function, has the capability to turn your digital world upside down. Given t…
The Avast Business Mobile Workforce Report 2018 shows small business owners what matters most to their employees and how they can create a mutually beneficial work environment that delivers optimal productivity alongside employee wellbeing.
Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …
If you’re following password best practices — and you are, right? — then you’ve got dozens of extra-long, extra-complex passwords to remember, and you’re using a unique one for each account — no repeats. (And we’ll add a hearty “Good job!” for t…
Cryptocurrency code breached, targeting Bitcoin exchanges
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a year. I was so emotional at the airport – I couldn’t talk! After many cups of tea and even more stares in an airport café, I had no more tears left and was finally able […]
The post At What Age Should Kids Join Social Media? appeared first on McAfee Blogs.
New research from Radboud University, related to the way the self-storage devices (SSDs) encrypt stored data, found that serious vulnerabilities exist in widely used products from popular manufacturers like Samsung and Crucial (Micron Technology). &n…
A quick Google search for “business security products” will produce an unwieldy number of results. How is a company to choose?
You make your home “smarter” which each connected device you add — a smart doorbell, a smart thermostat, a smart television — almost everything comes in a “smart” version these days, even toothbrushes. Device by device, you grow this IoT univers…