Featured Blogs
Four Ways To Use AI Responsibly
Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...
Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info
Turns out, scammers really love Barbie. As Barbie makes her debut on the big screen, scammers are aiming to cash...
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...
iPhone Update — Apply It Now If You Haven’t Already
Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should. Owners of iPads...
Be Mindful of These 3 AI Tricks on World Social Media Day
Happy World Social Media Day! Today’s a day about celebrating the life-long friendships you’ve made thanks to social media. Social...
How to Protect School Children From Deep Fakes
Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....
How to Protect Your Privacy From Generative AI
With the rise of artificial intelligence (AI) and machine learning, concerns about the privacy of personal data have reached an...
How to Protect Your Family From AI Scams
AI scams are becoming increasingly common. With the rise of artificial intelligence and technology, fraudulent activity is becoming more sophisticated...