Featured Blogs
What You Need to Know About the FedEx SMiShing Scam
You receive a text message saying that you have a package out for delivery. While you might feel exhilarated at...
What You Need to Know About the Google Chrome Vulnerabilities
While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting...
What You Need to Know About the Latest IoT Device Flaws
The McAfee Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and...
What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
What’s the Right Age to Give Your Child a Phone?
“Can I pleeease have my own phone?” The “first phone” is one of the most loaded questions a child can...
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
WhatsApp Security Hacks: Are Your ‘Private’ Messages Really Ever Private?
WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This month, WhatsApp (one...
WhatsApp With That? Security Flaw in Mobile Messaging Apps
Mobile phone calls and text messages seem to be going the way of the dinosaurs. In their place, a plethora...
What’s a Parent to Do? Closing the Protection Gap between You and Your Children.
Hands down, children look to their parents to keep them safe online more than anyone else, which begs the question—what’s...
What’s in the Box? Part II: Hacking the iParcelBox
Package delivery is just one of those things we take for granted these days. This is especially true in the...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
What’s the Deal with Mirai? A Rundown on one of the Biggest Botnets
Every once in a while, a type of malware become so effective and prevalent that it dominates headlines for weeks....
What’s the Meaning of VPN? VPN Defined
A virtual private network (VPN) is a tool that enables users to protect their privacy while using an internet connection....
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
When Does My Child Really Need A Phone?
Deciding when to give your child a phone is not an easy task. Should you wait until they start high...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of...
Which Cybersecurity Data Should You Trust?
Limitations of security data We are constantly battered by cybersecurity data, reports, and marketing collateral—and we shouldn’t treat all of this...
White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe
The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has...
Who loves tax season besides accountants? Hackers
Who loves tax season besides accountants? Hackers It’s tax time in the United States, and even if you’re pretty sure...
Why Am I Getting All These Notifications on my Phone?
Learn more about the Chrome notifications on Android mobile devices such as phones and tablets, and how McAfee Mobile Security protects users from malicious sites leveraging these notifications.