Featured Blogs
What Parents Need to Know about Popular Video, Audio Apps
If you hear laughing, dancing, goofiness, and a lead choreographer barking commands coming from the next room, chances are your...
What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...
What Parents Need to Know About KIK Messenger App
We write a lot about new apps on this blog because apps are hot in the very mobile teen world....
What MWC 2019 Shows Us About the Future of Connectivity
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress...
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using...
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
What Makes My Passwords Vulnerable?
Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.
What Leads a Child to Connect with Strangers Online?
At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity thieves found its...
What I’m Thankful for This Year: Combining Passion & Career
By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
What is ‘Covert Redirect’ and Should You be Worried?
When Heartbleed struck in April, it shook the Internet to its core in an almost literal sense: the vulnerability, which...
What is Wardriving?
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...
What is Typosquatting?
Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright)...
What is the Dark Web? Everything You Need to Know
You open up your laptop and check the daily news. You see a headline stating that one of your favorite online retailers was breached and that thousands of...
What is the Dark Web?
The dark web. The name raises all kinds of questions. What is the dark web, really? Where is it? Can...
What is the Cloud?
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe...
What Is Tailgating in Cybersecurity and How to Protect Yourself
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...
