Featured Blogs
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
Why Does My Car Have Its Own Smartphone?
You would be surprised at the number of places you can find a GSM SIM card. Outside of your mobile phone,...
Why Am I Getting All These Notifications on my Phone?
Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The Flowchart...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
What I’m Thankful for This Year: Combining Passion & Career
By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...