Articles by Author
McAfee News
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat...Jun 25, 2017 | 3 MIN READ
Mobile Security
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my...Jun 23, 2017 | 3 MIN READ
Privacy & Identity Protection
Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie....Jun 19, 2017 | 3 MIN READ
Security News
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her...Jun 14, 2017 | 3 MIN READ
Mobile Security
We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks...Jun 13, 2017 | 5 MIN READ
How To Guides and Tutorials
How to Avoid Falling for a Fake Ad Scam
They say impersonation is the sincerest form of flattery, but when it comes to the internet, copy...Jun 09, 2017 | 3 MIN READ
Privacy & Identity Protection
Connected Vacations: Top Takeaways from Our Unplugging Survey
It’s June, which means the sun is shining, schools out, and it’s time for a family summer...Jun 06, 2017 | 5 MIN READ
Family Safety
Curbing The Threat Of Fake Accounts
My bubbly teen was so excited the day she found Priyanka Chopra had started following her on...Jun 06, 2017 | 3 MIN READ
McAfee Labs
Misuse of DocuSign Email Addresses Leads to Phishing Campaign
DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an...Jun 01, 2017 | 4 MIN READ
Mobile Security
Android Devices Potentially Compromised by Judy App Weaknesses
We’ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack...May 31, 2017 | 3 MIN READ
Privacy & Identity Protection
Protecting Your Privacy on Social Media
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But,...May 24, 2017 | 5 MIN READ
Mobile Security
Fake WannaCry Protection Apps Hit the Google Play Store
WannaCry was the ransomware attack heard around the world. It impacted more than 150 countries and infected...May 24, 2017 | 3 MIN READ