Articles by Author
Family Safety
Why it’s important for parents to monitor kids’ digital footprint?
There is a new cybersafety awareness among the people of my generation – post the Blue Whale...Oct 04, 2017 | 3 MIN READ
Life at McAfee
Stefan’s Tale: A 17-Year Journey to McAfee
How did Stefan know McAfee was where he wanted to be and why did it take him 17 years to...Oct 03, 2017 | 5 MIN READ
Life at McAfee
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
For the last six consecutive years, The Dallas Morning News has recognized McAfee as one of the Top 100 Places...Sep 27, 2017 | 4 MIN READ
Mobile Security
Catch Phish If You Can
There are some movies you can watch over and over again. For me, it’s “Catch Me If...Sep 27, 2017 | 3 MIN READ
Privacy & Identity Protection
What Is Script-Based Malware? How to Stay Protected from This Cyberthreat
When you hear the word “script,” you probably think of either a movie script, or JavaScript. Though...Sep 26, 2017 | 3 MIN READ
McAfee News
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This...Sep 22, 2017 | 8 MIN READ
Family Safety
The importance of cyber self-defense education
This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear;...Sep 22, 2017 | 3 MIN READ
McAfee Labs
Microsoft Kills Potential Remote Code Execution Vulnerability in Office (CVE-2017-8630)
Recently the McAfee IPS Research Team informed Microsoft about a potential remote code execution vulnerability in Office 2016.Sep 21, 2017 | 6 MIN READ
Privacy & Identity Protection
Why Software Updates Are So Important
You’re hard at work on your computer or device and a message suddenly pops up saying, “a...Sep 19, 2017 | 3 MIN READ
McAfee News
Web Searches Get Complicated! Avril Lavigne Tops the 2017 Most Dangerous Celebrities List
We surf the internet to find the latest celebrity gossip, discover a new song, and even interact...Sep 18, 2017 | 4 MIN READ
Privacy & Identity Protection
Cyber Insurance – The Need of the Hour
Years ago, when we were complete newbies to computers, data loss was a frequent occurrence. Files were...Sep 15, 2017 | 4 MIN READ
Mobile Security
BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices
From headsets, to speakers – Bluetooth technology has become an integral part our devices, and our everyday...Sep 13, 2017 | 3 MIN READ