Articles by Author

Privacy & Identity Protection
Connected Cars: How One Vulnerability Can Turn Cybercriminals into Backseat Drivers
Whether it’s turning the music up a little, or turning down the AC – when you’re in...Aug 04, 2017 | 4 MIN READ

Mobile Security
Cybersecurity 101: Top Takeaways from Our Back to School Study
The end of summer is almost here, which means both parents and their kids are starting to...Jul 31, 2017 | 5 MIN READ

Security News
HBO Targeted by a Cyberattack, Potential “Game of Thrones” Scripts and Episodes Leaked
The night is dark and full of hackers. HBO (Home Box Office, Inc.) has been thrown into...Jul 31, 2017 | 4 MIN READ

Internet Security
World Wide Web – The journey from 1990
This year on my birthday, family and friends sent me gifts and flowers bought from online stores....Jul 31, 2017 | 4 MIN READ

Mobile Security
Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to...Jul 25, 2017 | 4 MIN READ

Mobile Security
Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to...Jul 25, 2017 | 4 MIN READ

Family Safety
Are Your Kids Playing Virtual Hide-n-Seek With You?
We all grew up playing hide-n-seek. Remember how your toddler loved playing hide-and-seek as well? Well, today’s...Jul 24, 2017 | 4 MIN READ

Life at McAfee
The Kids are in Charge
By Ribu, Communications Manager Kids are wonderful, aren’t they? And what could be better than having a...Jul 19, 2017 | 3 MIN READ

Security News
Ovidiy Stealer Malware Helps Cybercriminals Snatch Passwords for a Small Fee
You can buy almost anything online these days – clothes, books, food, the list goes on. That...Jul 19, 2017 | 3 MIN READ

Privacy & Identity Protection
Before Getting Rid of Your Old Devices, Say “Goodbye” to Lingering Data
When you think about it, the lifecycle of our devices is pretty short. Within a few years...Jul 18, 2017 | 5 MIN READ
McAfee Labs
Analyzing a Patch of a Virtual Machine Escape on VMware
This blog was written by Yakun Zhang. A virtual machine is a completely isolated guest operating system...Jul 17, 2017 | 10 MIN READ

Security News
Millions of Verizon Customers’ Phone Numbers and Accounts PINs Exposed
When your phone is experiencing an issue, you call support, ask for technical tips, and provide personal...Jul 13, 2017 | 3 MIN READ