Featured Blogs
Why Traditional Database Security Doesn’t Protect Data
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers...
Why use a VPN?
If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s...
Why You Need a Personal VPN
It used to be the case that only businesses used virtual private networks (VPNs) to connect securely to the internet...
Why You Need a VPN on Your Smartphone
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking...
Why You Need to Get a Family Technology Agreement Happening
There were multiple times during my digital parenting journey when I would have loved to put my head in the...
Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has...
Why You Need to Teach Your Kids to be Careful What They Search For Online
With information and video access at their fingertips most teens spend a crazy amount of time online looking for the...
Why You Need to Watch Out When Using Public Wi-Fi
If you’re like most people, you like to stay connected whether you are traveling or just on the go. That’s...
Why You Should Care About Fitness Tracker Security
Congratulations! You reached 10,000 steps today! It’s a great feeling when a wearable fitness device vibrates to let you know...
Why You Should Think Before Geotagging that Selfie
Do you remember the first time you posted on social media? Maybe it was a blog on LiveJournal or an...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
Why Your Kids Can’t Join Facebook Until They Are 13
Have you ever wondered why it is that your kids can’t join social media sites like Facebook until they are...
Why You’re Going to Have to Start Filtering Your Calendar Invitations
Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured “amazing savings” and discounts...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane...
Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations
During the last couple of months, we’ve observed several RTF exploits that target Indian organizations. The first RTF exploit was...
Windows 10 Makes a Strong Move Towards a Security Conscious Future
The past week has been an exciting one for cyber security announcements. On Tuesday, President Obama gave his State of...
Wired and Tired: 6 Simple Ways to Restore the Things Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers looked to me...
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
Women in Sales Part 1: Opportunities for Women Across Cybersecurity Sales
Collaborative, inclusive teams are what redefine cybersecurity solutions for every aspect of our connected world. At McAfee, women are making...
Women in Sales Part 2: Skilling up for a Career in Cybersecurity Sales
McAfee fosters an inclusive environment where we value varied life experiences. To showcase women who are making an impact and inspire others, we launched our Women in Sales Series. In Part 1, McAfee...
Women in Sales Part 3: Traits for Success in Cybersecurity Sales
At McAfee, women are finding the inclusiveness and tools to succeed in cybersecurity sales, a field often misconceived because of its technical background. They are doing...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
Women in the McAfee Channel
At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up...
Women’s History Month: 5 Women Who Changed Technology
Some say that men are from Mars and women are from Venus. But did you know that you have a...
Wonderwall of Lies: How to Avoid Oasis Reunion Ticket Scams
As the Gallagher brothers reunite for the first live Oasis shows in 16 years, scammers have queued up phony ticket...