McAfee

Editorial Team

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Internet Security
Spot Those Black Friday and Cyber Monday Shopping Scams
We’re not the only ones looking forward to the big holiday sales like Black Friday and Cyber...
Internet Security
‘Sleigh’ Holiday Shopping by Protecting Your Online Security
The onset of the global health emergency caused users everywhere to live, work, play, and buy through their devices. However,...
Privacy & Identity Protection
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your...
How To Guides and Tutorials
How to Prevent Keyboard Snooping Attacks on Video Calls
Video calling has rapidly become the mainstream method for remote communication, allowing users to stay connected. But very few may...
Internet Security
Thankful for broadband internet, and hopeful for much more  
We’ve shopped, worked, studied and taught, job hunted, and cared for each other online this year in ways we haven’t before. So much that it’s difficult to imagine...
Family Safety
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new...
Family Safety
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person goes online each day with the sole mission to trigger confrontation...
Family Safety
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques...
Family Safety
Are You Forwarding Jokes Or Spam?
With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent...
Family Safety
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you...
How To Guides and Tutorials
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance...
Mobile Security
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious...
325 - 336 of 1418

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top