Are You Unhackable?

By on Oct 04, 2017

Working in cybersecurity doesn’t make you immune to hackers, but it sure does make you more aware and more prepared.

One of the biggest things to remember is to always be skeptical. Skeptical of strange email addresses, random friend requests, unfamiliar Wi-Fi networks…everything. Learn the signs to look for and the things to avoid.

And listening to Hackable? will help.  

Being Protected While Staying Connected

We created Hackable? to shed some light on the various ways our lives can be infiltrated in the digital world. Many people don’t realize the countless areas hackers can exploit to gain access to their personal lives – and most don’t realize how easily it can happen. The good news, though, is that staying proactive can help keep you protected.

In a world where we get and stay connected, we’re constantly looking for resources to take our connectivity to the next level. We download apps and install software, store personal information and approve location sharing on our devices. All the while, not considering who might be trying to access what we’re putting out there. What many don’t realize is that malicious code can be written by hackers and attached to downloadable content with the sole purpose of damaging or disabling your computer or device.

As technology has advanced, so have hackers. They’ve gotten better at stealing information and doing so undetected. We wanted to share their secrets, so we invited some of the world’s smartest cyber experts to show us the ins and outs of hacking. We revealed their objectives and tactics in order to help you recognize the signs and stay alert.

Staying “Unhackable”

Our podcast kicks off by revealing how the familiar task of choosing a Wi-Fi network in a public place might get your personal information stolen, introducing listeners to what we, in the cyber-world, call an “Evil Twin Access Point.” This rogue wireless access point appears legitimate so that an attacker can gather information without the user’s knowledge. Other episodes demonstrate how easy it is to hack into someone’s webcam via a RAT (Remote Access Tool), which gives hackers a backdoor to access your laptop’s camera and microphone with ease. Or how a simple Google search can uncover personal information that can then be used to access your devices and data.

With episodes that reveal how hacker’s think and operate, we expose their tricks and schemes to help keep you more safe and secure.

Each episode of Hackable? gives consumers an inside look at the technology we use every day testing how safe we really are when using it. Plus, we dig into the details of how each hack goes down, and give away hackers’ secrets, letting you know what to watch for to stay out of their path.

Subscribe to the podcast on Apple Podcasts, Spotify, Stitcher, or wherever you get your podcasts, or check it out on

"metadata": {
"id": "450cf0eb-9a42-41aa-b2f4-c96998adb25f",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "",
"author": "McAfee",
"author-page": "",
"category": "Consumer Threat Notices",
"draft": "false",
"tinyimage": "",
"feedimageurl": "",
"pubDate": "Wed, 04 Oct 2017 12:35:48 +0000"

About the Author

Categories: Trusted Advisor

Subscribe to McAfee Securing Tomorrow Blogs