Articles by Author
Privacy & Identity Protection
Are Embedded OEM Device Manufacturers Responsible for Device Security?
The blog was written by Tom Moore. Threats against the Industries Today’s devices are becoming more internet-connected...May 02, 2017 | 2 MIN READ
Mobile Security
So, Your Phone Got Stolen. Here’s What to Do.
The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and...Apr 27, 2017 | 4 MIN READ
Family Safety
New Family Dynamics As the Connected Lifestyle Grows
“You know that we are living in a digital world and I am a digital girl.” I often...Apr 25, 2017 | 4 MIN READ
Privacy & Identity Protection
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer...Apr 21, 2017 | 3 MIN READ
Privacy & Identity Protection
Report Finds Some Health Apps Aren’t Healthy for Your Privacy
One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record...Apr 19, 2017 | 4 MIN READ
Internet Security
What You Need to Know About Livestreaming
Livestreaming is trending thanks to the convenience it brings. It is not just about watching matches online,...Apr 19, 2017 | 4 MIN READ
Privacy & Identity Protection
Are Connected Homes Mirai’s New Best Friend?
Whenever someone wonders why a strong password is so important, there’s one thing you can remind them...Apr 12, 2017 | 3 MIN READ
McAfee News
McAfee and the Security Innovation Alliance: Together is Power
New McAfee is here. We turn the page in the next chapter of this company’s story. It’s...Apr 11, 2017 | < 1 MIN READ
Mobile Security
Smart Home Goes Scandi As IKEA Rolls Out a Smart Home Lineup
Ah, IKEA. The furniture store probably best known for simple furnishings with not-so-simple assembly instructions (and simply...Apr 11, 2017 | 4 MIN READ
McAfee News
The Threat Landscape Has Evolved. But McAfee Has Too.
There is no question that the threat landscape has evolved. Gone are the times of...Apr 03, 2017 | 3 MIN READ
Privacy & Identity Protection
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar...Mar 31, 2017 | 4 MIN READ
Security News
Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low.
A lot of people love to play poker for the thrill and entertainment of sheer luck. For...Mar 29, 2017 | 4 MIN READ