Articles by Author

Privacy & Identity Protection
What You Need to Know About the Google Chrome Vulnerabilities
While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting...Nov 01, 2019 | 2 MIN READ

Family Safety
Chapter Preview: Ages 11 to 17 – From Tweens to Teens
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”Oct 31, 2019 | 2 MIN READ

Privacy & Identity Protection
3 Tips to Protect Yourself From the Office 365 Phishing Scams
Cybercriminals seem to get more and more sophisticated with their attacks, and phishing scams are no different. The McAfee Labs...Oct 30, 2019 | 3 MIN READ

Privacy & Identity Protection
A Cybersecurity Horror Story: Stay Secure From October’s Creepiest Threats
Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month...Oct 28, 2019 | 5 MIN READ

McAfee News
McAfee Reveals the Most Dangerous Celebrities Across the Globe
Earlier this week, we revealed McAfee's Most Dangerous Celebrity of 2019 in the U.S., Alexis Bledel. Growing from a young...Oct 25, 2019 | 3 MIN READ

McAfee Labs
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS...Oct 25, 2019 | 8 MIN READ

McAfee News
“Gilmore Girls” Actress Alexis Bledel Is McAfee’s Most Dangerous Celebrity
You probably know Alexis Bledel from her role as the innocent book worm Rory Gilmore in network television’s “Gilmore Girls”...Oct 21, 2019 | 3 MIN READ

Privacy & Identity Protection
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There's something ironic about cybercriminals getting "hacked back." BriansClub, one of the largest underground stores for buying stolen credit card...Oct 17, 2019 | 3 MIN READ

Internet Security
Chapter Preview: Ages 2 to 10 – The Formative Years
As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...Oct 17, 2019 | 3 MIN READ

Privacy & Identity Protection
Watch Your Step: Insights on the TOMS Shoes Mailing Hack
You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...Oct 10, 2019 | 3 MIN READ

Internet Security
Is Your Browser Haunted With Ghostcat Malware?
October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...Oct 04, 2019 | 3 MIN READ

Privacy & Identity Protection
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...Oct 03, 2019 | 2 MIN READ