Featured Blogs
How to Ace Your Video Interview: Job Hunting From Home
How to Ace Your Video Interview: Job Hunting from Home, Part Two So, it’s game day. Your online video interview...
Personal and Professional Development From Home
Personal and Professional Development from Home Like so many of us, I’m doing my best to look forward. While everyone’s...
World Password Day 2020
Are Your Password Habits Keeping You Safe Online? Learning how to navigate our entire lives online has definitely been a...
COVID-19 – Malware Makes Hay During a Pandemic
Special thanks to Prajwala Rao, Oliver Devane, Shannon Cole, Ankit Goel and members of Malware Research for their contribution and...
Cybercriminals Actively Exploiting RDP to Target Remote Organizations
The COVID-19 pandemic has prompted many companies to enable their employees to work remotely and, in a large number of...
ENS 10.7 Rolls Back the Curtain on Ransomware
Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...
What Does Your Password Say About Your Preferences?
Passwords say a lot about us. They speak to what we prioritize, what we hold dear. So when I recently saw my wife’s password included...
Making Moves to Go Green at McAfee Waterloo
By Gurjeet, Software Engineer, Canada “We should protect Mother Earth. If we don’t take care of her, she won’t take...
ST18 Chinese Cyber Crime with Anne An & Patrick Flynn
Chinese Cyber Crime Trends The head of McAfee Advanced Programs Group, Patrick Flynn and Security Researcher Anne An discuss Chinese...
ST19: Unified Cloud Edge with Cindy Chen & Michael Schneider
Unified Cloud Edge Explained In this episode, Senior Product Marketing Manager Cindy Chen and Senior Manager of Product Management Michael...
Is Your Child Being Cyberbullied? What Parents Need to Know
In this season of social distancing, teens need their friends more than ever. Daily digital connection — through texting, video...
How to Stay Protected From Malware While Online at Home
Our everyday lives are not what they used to be three months ago. Many users have made the transition from...
Protect Yourself Against Phishing Scams With These Security Tips
Phishing is one of the oldest cyberthreats in the book, and yet still one of the most effective. As people across the globe...
How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner
Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will...
What is disk cleanup and does it remove viruses?
What is Disk Cleanup and does it remove viruses? It happens. You’re in the middle of a computing task, and...
Bitcoin Security: Mining Threats You Need to Know
The value of bitcoin has had its ups and downs since its inception in 2013, but its recent skyrocket in...
My Flight Path: From the Royal Air Force to McAfee
By: Gareth, Technical Support Engineer, UK Where do you see yourself in five years? This well-known question is the crux...
Cool and Helpful McAfee Tech to Help Secure Your Online Life
These days, we’re all actively engaging online. Whether it’s my kids scrolling through social media, my wife video chatting with her friends and...