Articles by Author
Privacy & Identity Protection
Smart Home, or Dumb Home/Smart Cloud?
At the end of my street, tucked between some bushes and a tree in someone else’s garden,...Nov 13, 2015 | 4 MIN READ
Privacy & Identity Protection
Introducing the ‘Most Hackable’ Gifts of the Holiday Season
Let’s take a look at this year’s most hackable holiday gifts, and how you can easily make them more secure.Nov 10, 2015 | 5 MIN READ
Privacy & Identity Protection
Mobile Attacks: The Golden Age for Hackers
It’s fun to re-watch shows like “Friends” and realize that so many plot lines are irrelevant today...Nov 10, 2015 | 3 MIN READ
Privacy & Identity Protection
Chip and PIN Credit Cards: More Secure, But Not Perfect
When it comes to credit cards, Chip and PIN technology is more secure than traditional magnetic strips—but it isn't perfect.Oct 26, 2015 | 4 MIN READ
Family Safety
Making Online Safety a Priority for Our Tech-Savvy Children
The joy of parenthood! We offer our children the best opportunities to help them become happy, healthy,...Oct 26, 2015 | 6 MIN READ
Privacy & Identity Protection
From the Ground Up: How the Cars of the Future Will Be Secured
In a few short years, we’ll start to see driverless cars become much more common. But how will we secure...Oct 06, 2015 | 3 MIN READ
Privacy & Identity Protection
McAfee delivers Updates to its Comprehensive Android Optimization Solutioner
McAfee just released the latest update to its McAfee Battery Optimizer, a complete device optimization app that...Oct 06, 2015 | 3 MIN READ
Privacy & Identity Protection
Is Your App Conspiring to Make Your Private Information Public?
Apps! They help us make the most of our time and bring ease in our busy lifestyle...Sep 29, 2015 | 4 MIN READ
McAfee News
The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance
McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.Sep 28, 2015 | 4 MIN READ
McAfee Labs
Japanese Banking Trojan Shifu Combines Malware Tools
A new banking Trojan combines elements of multiple malware tools. Shifu has circulated since April, and attacks primarily Japanese banks.Sep 24, 2015 | 6 MIN READ
Security News
XcodeGhost Pulled from App Store After a Good Scare: What to Know
Hackers embedded infectious code into apps by tricking developers into using a phony version of Apple's Xcode development software, called...Sep 23, 2015 | 3 MIN READ
Privacy & Identity Protection
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can...Sep 21, 2015 | 3 MIN READ