Consumer

Get online safety tips and stay up to date on the latest computer security news, like what third-party apps are safe to install.

Mobile and IoT Security

Ransomware Goes Mobile

The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they’ve previously used to target personal computers—tools like ransomware. Ransomware is a type of malicious software that either locks you out of your device, and/or holds your data hostage, until ...

Family Safety Identity Protection

USB Drives – With Convenience Comes Risk

I’m sure most of us have used a USB drive (or thumb drive) at one point or another. They are super convenient to transfer files, especially when they are too large for email or you don’t have access to an Internet connection. But it’s this same convenience of being portable, ...

Consumer Threat Notices

Strike a Pose: Blackshades Malware Spies Through Your Webcam

In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private business. Now, it seems that even with the shades drawn, one must also shutter their webcam. Earlier this week, the FBI initiated a crackdown leading to the arrest of nearly ...

Family Safety

The One Twitter Feature Every Parent Should Know How to Use

  Sometimes as a parent you have to put on the war paint and do a little extra recon online. After all, isn’t it only fair that if your child breaks the ground rules for using Twitter (which is that he must keep his account private) that you make sure that ...

Consumer Threat Notices

Giving Back: McAfee Global Community Service Day

This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer at a variety of charities and non-profits in more than 25 countries across the globe, I think it’s safe to say that the day was a success. Between delivering meals ...

Family Safety Identity Protection Mobile and IoT Security

What is a Man-in-the-Middle Attack?

There’s a reason why most people feel uncomfortable about the idea of someone eavesdropping on them—the eavesdropper could possibly overhear sensitive or private information. This is exactly the risk that computer users face with a common threat called a “Man-in-the-Middle” (MITM) attack, where an attacker uses technological tools, such as ...

Mobile and IoT Security

Perception vs. Reality: Facebook Anonymous Login Feature

Perception plays a huge role in many aspects of daily life. However, the reality of something is often not as powerful as the idea may have been—and advertisers as well as brands more often than not take full advantage of this fact. Privacy in the online world has become a ...

Identity Protection Mobile and IoT Security

What is a Backdoor Threat?

Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back door open at home could allow someone to enter your home and take your personal belongings. The same is true for a backdoor in the computer world. It is a ...

Consumer Threat Notices

What is ‘Covert Redirect’ and Should You be Worried?

When Heartbleed struck in April, it shook the Internet to its core in an almost literal sense: the vulnerability, which could allow hackers to trick servers into surrendering sensitive data, took advantage of how communications are made online. Now, there’s a new vulnerability in town claiming to be the next ...

Family Safety

What Should the Consequences Be for a Teens’ Digital Slip-Up?

Usually the first question I get from panicked parents who just found something shocking on their child’s phone is, “what should the consequence be?” It’s also not unusual for them to want to take every piece of technology their child owns and throw it in an industrial-sized meat grinder. But ...

Subscribe to McAfee Securing Tomorrow Blogs