Featured Blogs
How Do I Protect Myself When Using Wi-Fi?
Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are...
What is ATM Skimming?
Ever take a look at an ATM and feel like something’s off? You might have come across an ATM skimmer....
How Protected Am I Online?
“How protected am I online?” Customers often ask us some version of this question. It’s a good question, and in the past, there was no direct...
10 Back-to-School Tech Tips for Kids, Teens and College Students
Farewell, summer. Hello, back-to-school season! While the chill may not be in the air yet, parents may be feeling the...
How Secure is Video Conferencing?
For millions of people, it’s not a workday without it — video conferencing. And plenty of business gets done that...
How Not to Fall for Smishing Scams
With a buzz, your phone lets you know you got a text. You take a peek. It’s from the U.S....
Data Breach Exposes 3 Billion Personal Information Records
News of a major data breach that could affect nearly three billion records comes to light from a somewhat unusual...
Deepfakes of Prince William Lure Social Media Users into an Investment Scam
Deepfakes of Prince William and the UK Prime Minister are pushing investment scams on Facebook and Instagram. Uncovered by Fenimore...
How to Protect Your Identity, Finances, and Security Online
If you want to protect your identity, finances, and privacy online, you have a pretty powerful tool at hand. It’s...
5 Minute Parent’s Guide to Social Media
The time has come. Your kids are chafing at the bit to get on social media and you can no...
Introducing World’s First Automatic and AI-powered Deepfake Detector
In today’s digital age, the line between reality and digital fabrication is increasingly blurred, thanks to the rise of deepfake...
How to Spot Phishing Lures
Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to...
Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school....
How to Talk to Your Grandparents About Staying Safe Online
Reports filed with the U.S. Federal Trade Commission (FTC) put the risks in perspective — scammers squarely target older adults....
Internet Safety Begins with All of Us
A safer internet isn’t a nice thing to have. It’s a necessity because we rely on it so heavily. And there’s...
Is Your Smart Home Vulnerable to a Hack Attack?
Your smart home hums right along. It sets your alarm, opens your garage door, pops up recipes on your refrigerator...
Wonderwall of Lies: How to Avoid Oasis Reunion Ticket Scams
As the Gallagher brothers reunite for the first live Oasis shows in 16 years, scammers have queued up phony ticket...
How to Safely Bank Online
Mobile banking is highly secure — when you take a few straightforward steps, it becomes even safer. And those steps...
A Guide for Parents to Help Kids Navigate Social Media Safely
As the back-to-school season approaches, equipping children with the tools and knowledge to navigate social media safely is crucial. In...
New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition
Authored by SangRyol Ryu Recently, McAfee’s Mobile Research Team uncovered a new type of mobile malware that targets mnemonic keys...
Why Sharing Your Kids’ Pics Online Is Not A Good Idea
Probably like you, I’ve always struggled to find enough time to stay up to date with all my friends. So...
How to Spot Fake Login Pages
Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen,...
Cybersecurity Tips for Students Returning to School
Almost every teenager in the United States (approximately 96%) reports using the internet daily. As students prepare to return to...
How to Talk To Your Kids About Identity Theft
Let’s be honest, talking to your kids about identity theft isn’t probably top of your list. There’s a long list...
Tom Hanks Warns Fans: The Dark Side of AI Scams
Tom Hanks, one of the most recognizable faces in the world, warns that scammers have swiped his likeness in malicious...
What is an AI PC?
As technology rapidly advances, the boundaries of what’s possible in personal computing are continuously expanding. One of the most exciting...
How To Minimise the Fallout From a Data Breach
There used to be a saying that ‘nothing is certain except death and taxes’. Well, I now think it needs...