McAfee

Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Privacy & Identity Protection
Smart Home, or Dumb Home/Smart Cloud?
At the end of my street, tucked between some bushes and a tree in someone else’s garden,...
Privacy & Identity Protection
Introducing the ‘Most Hackable’ Gifts of the Holiday Season
Let’s take a look at this year’s most hackable holiday gifts, and how you can easily make them more secure.
Privacy & Identity Protection
Mobile Attacks: The Golden Age for Hackers
It’s fun to re-watch shows like “Friends” and realize that so many plot lines are irrelevant today...
Privacy & Identity Protection
Chip and PIN Credit Cards: More Secure, But Not Perfect
When it comes to credit cards, Chip and PIN technology is more secure than traditional magnetic strips—but it isn't perfect.
Family Safety
Making Online Safety a Priority for Our Tech-Savvy Children
The joy of parenthood! We offer our children the best opportunities to help them become happy, healthy,...
Privacy & Identity Protection
From the Ground Up: How the Cars of the Future Will Be Secured
In a few short years, we’ll start to see driverless cars become much more common. But how will we secure...
Privacy & Identity Protection
McAfee delivers Updates to its Comprehensive Android Optimization Solutioner
McAfee just released the latest update to its McAfee Battery Optimizer, a complete device optimization app that...
Privacy & Identity Protection
Is Your App Conspiring to Make Your Private Information Public?
Apps! They help us make the most of our time and bring ease in our busy lifestyle...
McAfee News
The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance
McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.
McAfee Labs
Japanese Banking Trojan Shifu Combines Malware Tools
A new banking Trojan combines elements of multiple malware tools. Shifu has circulated since April, and attacks primarily Japanese banks.
Security News
XcodeGhost Pulled from App Store After a Good Scare: What to Know
Hackers embedded infectious code into apps by tricking developers into using a phony version of Apple's Xcode development software, called...
Privacy & Identity Protection
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can...
1069 - 1080 of 1416

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top