Articles by Author
      
        Mobile Security
        
      Millions of Android Devices Hit With CopyCat Malware
Time and time again, we’ve seen Android malware make its way through mobile devices around the world....Jul 11, 2017 | 3 MIN READ
      
        Life at McAfee
        
      Coming Home To Vote for Marriage Equality
By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate...Jul 11, 2017 | 4 MIN READ
      
        Privacy & Identity Protection
        
      The ‘Beginners Guide To IoT’
This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in...Jul 11, 2017 | 3 MIN READ
      
        Internet Security
        
      The Trends & Challenges Facing The Internet Of Things
This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace...Jul 11, 2017 | 4 MIN READ
      
        How To Guides and Tutorials
        
      Is Your Bank Secure? How to Protect Your Financial Information
Modern day banking is made to be easy – we login into our bank’s app on our...Jul 07, 2017 | 3 MIN READ
      
        Family Safety
        
      Combining The Old With The New
Combining The Old With The New “Mom look, that’s the app I was telling you about!” remarked...Jun 30, 2017 | 4 MIN READ
      
        Security News
        
      Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya,...Jun 27, 2017 | 3 MIN READ
      
        McAfee News
        
      The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat...Jun 25, 2017 | 3 MIN READ
      
        Mobile Security
        
      Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my...Jun 23, 2017 | 3 MIN READ
      
        Privacy & Identity Protection
        
      Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie....Jun 19, 2017 | 3 MIN READ
      
        Security News
        
      Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her...Jun 14, 2017 | 3 MIN READ
      
        Mobile Security
        
      We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks...Jun 13, 2017 | 5 MIN READ