Featured Blogs
Your Back To School Tech Plan
I am such a fan of school holidays! No music lessons, no sport, no commitments. Bliss!! The crazy school term...
Determined to Find Love Online in 2018? Here are 5 Ways to Protect Your Privacy
It turns out January is the busiest month for online dating since millions of singles have resolved to embark on...
Bringing Security to the Cloud and Beyond
I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one...
Stepping Into a Cyber Safe 2018
A very Happy New Year to all my dear readers and may this year be another fragrant flower that you...
Key Innovations and Takeaways from CES 2018
Every year, practically everyone in the consumer electronics industry catches a flight and heads to Las Vegas for The International...
5 Ways to Be Proactive When Protecting Your Personal Data
WannaCry, Equifax and Uber—in the wake of a data emergency, I often find myself hyperconscious of my online security measures:...
2018 Texting Slang Update: How to Decode What Your Teen is Saying Online
Every year we update our teen slang and this year we’ve added a handful of terms that may make your...
North Korean Defectors and Journalists Targeted Using Social Networks and KakaoTalk
Recently, South Korean media wrote about North Korean refugees and journalists being targeted by unknown actors using KakaoTalk (a popular...
How McAfee Embedded Security Helps Medical Device Manufacturers
The blog was written by Tom Moore. Like other Internet of Things (IoT) devices, medical equipment is a vulnerable attack...
McAfee’s #RT2WIN CES Sweepstakes Terms and Conditions
We’re so excited to head to Las Vegas next week for CES! To celebrate, we’re giving fifteen people a chance...