Featured Blogs
#WorldKindnessDay: How to Help Kids Tap into their Superpower of Being Kind
“There is no small act of kindness. Every compassionate act makes large the world.” —Mary Anne Radmacher, American writer,...
Why Social Engineering is a Scammer’s Secret Weapon
Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind...
McAfee Warriors – Building a Community Inclusive of Military Veterans
By Dawson McPherson, Talent & Communications Coordinator As we make our way into the month of November, it’s easy to...
STEM – How and Why To Get Your Daughter Involved
In 1990, the buzz around STEM (science, technology, engineering and maths) just didn’t exist. When I was doing my HSC,...
Marcher Malware Uses Both Credential and Credit Card Phishing to Steal Financial Data
Actors turned models turned singers — pretty much the definition of a “triple threat” in the entertainment industry. However, the...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Kids Glued to YouTube? Here are 7 Ways to Keep them Safe While Having Fun
I spend a lot of time on YouTube. I watch health, parenting, and cooking videos until my eyes cross. And...
Self-Signed Certificates Can Be Secure, So Why Ban Them?
This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden...
Massive Malaysian Data Breach Compromises Over 46 Million Phone Numbers
There are data breaches that impact an entire customer group, or even a certain state. And then there are data...
Be a Social Media-Savvy Parent For Your Kids
If your kids are ready to join the social media bandwagon, but you are completely lost when it comes to...