Articles by Author

Internet Security
What You Need to Know About Livestreaming
Livestreaming is trending thanks to the convenience it brings. It is not just about watching matches online,...Apr 19, 2017 | 4 MIN READ

Privacy & Identity Protection
Are Connected Homes Mirai’s New Best Friend?
Whenever someone wonders why a strong password is so important, there’s one thing you can remind them...Apr 12, 2017 | 3 MIN READ

McAfee News
McAfee and the Security Innovation Alliance: Together is Power
New McAfee is here. We turn the page in the next chapter of this company’s story. It’s...Apr 11, 2017 | < 1 MIN READ

Mobile Security
Smart Home Goes Scandi As IKEA Rolls Out a Smart Home Lineup
Ah, IKEA. The furniture store probably best known for simple furnishings with not-so-simple assembly instructions (and simply...Apr 11, 2017 | 4 MIN READ

Security News
The Threat Landscape Has Evolved. But McAfee Has Too.
There is no question that the threat landscape has evolved. Gone are the times of...Apr 03, 2017 | 3 MIN READ

Privacy & Identity Protection
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar...Mar 31, 2017 | 4 MIN READ

Security News
Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low.
A lot of people love to play poker for the thrill and entertainment of sheer luck. For...Mar 29, 2017 | 4 MIN READ

How To Guides and Tutorials
Online Shopping Festivals – Things to Do Before Clicking on Add to Cart
Online sales are a huge rage these days! E-commerce firms are competing with each other to offer...Mar 29, 2017 | 3 MIN READ

Family Safety
These Cute Teddy Bears Have Been Recording Your Kids
When we think of cyberhacks, we often think of criminals trying to break into a network of...Mar 28, 2017 | 5 MIN READ

Security News
Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks
In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance...Mar 22, 2017 | 3 MIN READ

Privacy & Identity Protection
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out....Mar 17, 2017 | 5 MIN READ

Mobile Security
Pre-Installed Malware on Android Devices Expose Flaws in Supply Chain
Pencils come with erasers, books come with pages, and taxes (most of the time) come with returns....Mar 16, 2017 | 3 MIN READ