Featured Blogs
Working 9 to 5 on Mobile Security
I love watching old movies, like the classic “9 to 5” and realizing how antiquated the tools used in the...
Working Together to Ensure Better Cybersecurity
For many, it’s hard to picture a work environment that doesn’t revolve around the use of technology. Digital, cloud-based services...
World Password Day – Stop Worrying, Start Using A Password Manager
“Open Sesame”! Most of us have grown up hearing these magic words, the secret password, that know would reveal the...
World Password Day 2020
Are Your Password Habits Keeping You Safe Online? Learning how to navigate our entire lives online has definitely been a...
World Password Day RT to Win Sweepstakes
Terms and Conditions How to Win: Happy World #PasswordDay! Once completed share your results on Twitter and tag @McAfee_Home, #PasswordDay,...
World Password Day: Make Passwords the Strongest Link in Your Online Security
World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene...
World Wide Web – The journey from 1990
This year on my birthday, family and friends sent me gifts and flowers bought from online stores. Even my cake...
World Wide Web Day: How to Protect Your Family Online
The first of August marks the celebration of World Wide Web Day – a day dedicated to the global network...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Worried About App Permissions and Your Privacy? Check Out McAfee and Verizon’s App
Listen up, Android users! As Robert Siciliano mentioned in one of his recent blogs, the Android OS has become the...
Would You Know How to Help Someone in Emotional Crisis Online?
The more connected we become through technology, the harder it may be to reach out to another person and ask...
Wrong Number: Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates....
XcodeGhost Pulled from App Store After a Good Scare: What to Know
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...
Yahoo! Hacked: 15 Tips To Better Password Security
In light of the Yahoo Voices hack where 450,000 passwords have been compromised, it’s time again to let the world...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
YOLO: What Parents Need to Know About the Anonymity App Kids Use with Snapchat
If your kids use Snapchat, chances are they also use the popular new app YOLO along with it. Since it’s...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
You Could Get Prank Called (and Charged) By Your Own Phone
Most people would never think to prank call themselves. However, they may be allowing their smart phones to do just...
You Might Not Be a Celebrity, But You Could Still Get Hacked
In 2016, there’s a ‘who’s who’ of A-list celebrities. No, it’s not who was invited to the Academy Awards or...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
You, Your Company, and BYOD: A Love Triangle
BYOD, or bring your own device, has become the new normal in the corporate workplace. But with this convenience comes...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
Your Back To School Tech Plan
I am such a fan of school holidays! No music lessons, no sport, no commitments. Bliss!! The crazy school term...