Articles by Author
McAfee News
McAfee Displacement Products Create a Trip of a Lifetime
This blog was written by Richard Steranka. In the second half of 2016, we challenged our Platinum...Jan 30, 2017 | 3 MIN READ
Privacy & Identity Protection
Manage your data this Data Privacy Day
You know when Valentine’s Day is, and on which day Friendship Day falls, but do you know...Jan 28, 2017 | 4 MIN READ
Mobile Security
Two Attacks On Mobile Banking Are Back
It feels as through every day, a new app is released that makes it easier to pay...Jan 24, 2017 | 4 MIN READ
Family Safety
Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages...Jan 23, 2017 | 5 MIN READ
Family Safety
Digital Wallets: Safety tips from an industry leader
As digitization gains traction and we move towards a cashless economy, it will be of great help...Jan 23, 2017 | 5 MIN READ
Privacy & Identity Protection
Doctoring Data: Why Cybercriminals Have Their Eye on Healthcare
Fun fact: your healthcare data is worth roughly 10 times as much as your credit card number....Jan 20, 2017 | 3 MIN READ
McAfee News
What You Need to Know About Security Threats in 2017
2016 has been an exciting year on the tech front, with our hearts being won over by...Jan 12, 2017 | 4 MIN READ
McAfee News
From Smart Shoes to Safe Routers: Innovation Shines Bright at CES 2017
CES 2017 (the Consumer Electronics Show) has come and gone once again, bringing with it the newest...Jan 11, 2017 | 4 MIN READ
Mobile Security
The Most Important Mobile Security Resolutions for 2017
With our guidelines, you’ll be ready to face the new year head-on, knowing how to improve your mobile security in...Jan 10, 2017 | 5 MIN READ
Mobile Security
How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can manipulate every device connected to an entire network? That’s the Switcher malware motto.Jan 05, 2017 | 3 MIN READ
Privacy & Identity Protection
Securing Today’s Connected Home
Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected...Jan 04, 2017 | 4 MIN READ
Privacy & Identity Protection
Medical IoT Manufacturers Given Guidelines on Lifelong Devices Security, Courtesy of FDA
2016 appears to have one more gift for us before calling it a year, and this time...Dec 30, 2016 | 3 MIN READ