Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Privacy & Identity Protection
10 Easy Things You Can Do Today to Improve Your Cybersecurity
With the number of cyber threats and breaches dominating the headlines, it can seem like a Herculean...
Privacy & Identity Protection
How to Protect Yourself and your Identity Before You Leave on Vacation
Your summer vacation is approaching quickly! You can’t wait to take time away from your responsibilities, jump...
Privacy & Identity Protection
Three Reasons You Need a VPN
You know what a VPN is, but the question remains—why do you need a VPN?  There’s one...
Privacy & Identity Protection
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that?  Great question. Because it gets...
Mobile Security
Mobile Spyware—How You Can Keep Stalkers Off Your Phone
When you wind up with mobile spyware, you may wind up with a stalker on your phone. ...
Internet Security
Steer Clear of Rip-offs: Top Tips for Safer Online Shopping
Everyone loves a great deal when they shop online. Until they discover it’s a rip-off.  Social media...
Mobile Security
Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft
Maybe you know that sinking feeling all too well. “Where did I leave my phone?”  The minutes...
Internet Security
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks
Concerned about ransomware? McAfee stops it dead in its tracks.  Newly published findings from the independent labs...
Privacy & Identity Protection
How to Avoid Phishing Attacks on Your Smartphones and Computers
Ping, it’s a scammer!  The sound of an incoming email, text, or direct message has a way...
Family Safety
How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids
While Twitter use by teens has dropped overall, plenty of kids still flock to the popular network....
Privacy & Identity Protection
Plenty of Phish in the Sea—Your Guide to Spotting Phishing Emails and Scams
There are plenty of phish in the sea.  Millions of bogus phishing emails land in millions of...
Privacy & Identity Protection
The Strongest Passwords and the Best Way to Create (and Remember) Them
Some of the strongest passwords you can use are the ones you don’t have to remember.  Strange...
1 - 12 of 1434

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

Back to top