Featured Blogs
Staying Safe While Working Remotely
In the shadow of the COVID-19 pandemic, workplaces worldwide have undergone a seismic shift towards remote working. This article aims to provide a comprehensive guide on how you, as an employee, can augment your cybersecurity measures and stay safe when working remotely.
If You Give A Hacker Your Email Address…
Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.
Celebrities Are Lures For Scammers
Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims.
Could Your Kids Spot an Online Predator?
As parents, caregivers, and mentors, it's our responsibility to educate and guide our children about the virtual perils that lurk within their screens. An essential part of this is continuous communication, ensuring they understand the gravity of the situation and can recognize the deceptive tactics employed by these predators
A Detailed Guide on Cyberbullying
Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. Therefore, it's crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.
Smart TVs and Refrigerators Used in Internet-of-Things Cyberattack
In this article, we’ll explore what happened when hundreds of thousands of these devices were roped into an extensive Internet-of-Things (IoT) cyber attack, how it happened, and how you can protect your smart devices to stay safe.
Before You Download: Steer Clear of Malicious Android Apps
Cybercriminals like to get in on a good thing. Case in point, mobile apps. We love using apps and they love making bogus ones—malicious apps designed to harm phones and possibly the person using them. The good news is that there are ways you can spot these imposters. These six ...
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote In the early days of the COVID-19 pandemic, another...
ST22: Attivo Networks with Greg Vinson & Tushar Kothari
Threat Solutions McAfee’s Global Business Development Manager, Greg Vinson and CEO of Attivo Networks, Tushar Kothari discuss the solutions to...
Career change? Cybersecurity companies are hiring.
Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...
Stay Connected & Protected: Weaving Security Into Our Social Media Habits
Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we...
8 Ways to Help Senior Adults Stay Safe Online These Days
8 Ways to Help Senior Adults Stay Safe Online These Days Technology has come in handy for most of us...
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will...
Why Should You be Careful When Using Hotspots or Free Wi-Fi?
The ability to be connected anywhere, anytime is extraordinary, but it also presents a significant security concern. Unsecured Wi-Fi networks can expose our personal and sensitive data to potential hackers.
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Do the Benefits of Bitcoin Outweigh the Risks?
Cryptocurrencies like Bitcoin are the future of tomorrow’s digital payment system—or are they? The same benefits that make them a popular choice with online users have also made them popular amongst online thieves, sparking a wave of ransomware attacks in the last few years. This begs the question: do the ...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...