Featured Blogs
15 Easy, Effective Ways to Start Winning Back Your Online Privacy
Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a...
Watch Your Step: Insights on the TOMS Shoes Mailing Hack
You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...
Stay Smart Online Week 2019
Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are...
Device & App Safety Guide for Families
While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...
Is Your Browser Haunted With Ghostcat Malware?
October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars
Episode 2: The All-Stars Analyzing Affiliate Structures in Ransomware-as-a-Service Campaigns This is the second installment of the McAfee Advanced Threat...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us
Episode 1: What the Code Tells Us McAfee’s Advanced Threat Research team (ATR) observed a new ransomware family in the...
McAfee Receives the 2019 Security Excellence Award From IoT Evolution
If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...