Featured Blogs
A Look Beyond Their Lock Screens: The Mobile Activity of Tweens and Teens
While our tweens and tweens seem to grow into adults right before our eyes, their mobile usage matures into adulthood...
A New Android Banking Trojan Masquerades as Utility and Banking Apps in India
Authored by Dexter Shin Over the years, cyber threats targeting Android devices have become more sophisticated and persistent. Recently, McAfee...
A New Program for Your Peloton – Whether You Like It or Not
Executive Summary The McAfee Advanced Threat Research team (ATR) is committed to uncovering security issues in both software and hardware to help developers...
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
A Parent’s Guide to ChatGPT
ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history...
A Parent’s Guide To The Metaverse – Part One
We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of the world’s biggest...
A Parent’s Guide To The Metaverse – Part Two
Welcome back to part 2 of my Metaverse series. If you are after tips and strategies to help your kids...
A Parent’s Guide to TikTok
Finding someone who hasn’t heard of TikTok in 2022 would be quite the achievement. As one of the most popular...
A PayPal Email Scam Is Making the Rounds: Here’s How to Identify and Avoid It
Payment applications make splitting restaurant bills, taxi fares, and household expenses so much easier. Without having to tally totals at...
A Quick Analysis of the Flash Player Opcode-Verifying Code Execution Vulnerability
On October 12, McAfee Labs learned of proof-of-concept code exploiting a newly patched Flash Player vulnerability. Adobe had patched this...
A Quick Guide to ‘Zero-Day Threats’ and How They Affect You
If you’re looking for a cybersecurity term that sounds intimidating and impressive to those who aren’t familiar with the field,...
A Reflection on Mobile World Congress
This blog post was written by Nick Viney. As the dust settles on another busy year at Mobile World Congress,...
A Safer Internet for You, Your Family, and Others Too
With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
A Traveler’s Guide to International Cybersecurity
Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....
A Year in Review: Threat Landscape for 2020
As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the...
Access Denied! New Instagram Hack Kicks Users Out of Their Accounts
Instagram is undoubtedly one of, if not the most popular social media platform among users today. Everyone from celebrities to...