Featured Blogs
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
The Latest Pawn in the Warranty Fraud Game? Fitbit Users
With great technology comes great responsibility. This is particularly true when it comes to protecting technology. And with more and...
The Legacy Continues – What Black History Month Means to Us
By Karla, Digital Media Specialist At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the...
The Louvre Used Its Own Name as a Password. Here’s What to Learn From It
If you’ve been watching the news, you’ve probably seen the headlines out of Paris: one of the most audacious heists...
The McAfee Adventures of a Middle School Teacher
By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. –...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
The Mobile Web vs. Native Apps
The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
The Most Hackable Christmas Gifts of 2016 – Are You Prepared?
I’ve decided that 2016 will be a calm and collected Christmas in our house. I’m saying NO to last minute...
The Most Impersonated Brands in Holiday Shopping, Ranked
Scammers aren’t worried about ending up on the naughty list. If anything, they’re doubling down in 2025. This year, scammers are impersonating major brands with startling accuracy,...
The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that...
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
The Mysterious, Ominous Dark Web: A Primer for the Rest of Us
These past weeks have not been kind to those seeking privacy for conducting illicit activities. The Ashley Madison hack came to...
The New Intern-Net
By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...
