Articles by Author
Security News
Millions of Verizon Customers’ Phone Numbers and Accounts PINs Exposed
When your phone is experiencing an issue, you call support, ask for technical tips, and provide personal...Jul 13, 2017 | 3 MIN READ
Mobile Security
Millions of Android Devices Hit With CopyCat Malware
Time and time again, we’ve seen Android malware make its way through mobile devices around the world....Jul 11, 2017 | 3 MIN READ

Life at McAfee
Coming Home To Vote for Marriage Equality
By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate...Jul 11, 2017 | 4 MIN READ
Privacy & Identity Protection
The ‘Beginners Guide To IoT’
This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in...Jul 11, 2017 | 3 MIN READ
Internet Security
The Trends & Challenges Facing The Internet Of Things
This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace...Jul 11, 2017 | 4 MIN READ
How To Guides and Tutorials
Is Your Bank Secure? How to Protect Your Financial Information
Modern day banking is made to be easy – we login into our bank’s app on our...Jul 07, 2017 | 3 MIN READ
Family Safety
Combining The Old With The New
Combining The Old With The New “Mom look, that’s the app I was telling you about!” remarked...Jun 30, 2017 | 4 MIN READ
Security News
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya,...Jun 27, 2017 | 3 MIN READ
McAfee News
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat...Jun 25, 2017 | 3 MIN READ
Mobile Security
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my...Jun 23, 2017 | 3 MIN READ
Privacy & Identity Protection
Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie....Jun 19, 2017 | 3 MIN READ
Security News
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her...Jun 14, 2017 | 3 MIN READ