Featured Blogs
World Password Day 2020
Are Your Password Habits Keeping You Safe Online? Learning how to navigate our entire lives online has definitely been a...
World Password Day RT to Win Sweepstakes
Terms and Conditions How to Win: Happy World #PasswordDay! Once completed share your results on Twitter and tag @McAfee_Home, #PasswordDay,...
World Password Day: Make Passwords the Strongest Link in Your Online Security
World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene...
World Wide Web – The journey from 1990
This year on my birthday, family and friends sent me gifts and flowers bought from online stores. Even my cake...
World Wide Web Day: How to Protect Your Family Online
The first of August marks the celebration of World Wide Web Day – a day dedicated to the global network...
Worms Could Spread Like Zombies via Internet of Things
Security researchers recently created a proof-of-concept attack against Internet-connected lightbulbs, causing breached devices to infect their neighbors. The propagation...
Would You Know How to Help Someone in Emotional Crisis Online?
The more connected we become through technology, the harder it may be to reach out to another person and ask...
Wrong Number: Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates....
XcodeGhost Pulled from App Store After a Good Scare: What to Know
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
YOLO: What Parents Need to Know About the Anonymity App Kids Use with Snapchat
If your kids use Snapchat, chances are they also use the popular new app YOLO along with it. Since it’s...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
You Could Get Prank Called (and Charged) By Your Own Phone
Most people would never think to prank call themselves. However, they may be allowing their smart phones to do just...
You Have a Right to Delete Your Data—But Dozens of Data Brokers Hide How to Do It
You can request data brokers to remove your personal info from their databases. But finding their request forms is another...
You Might Not Be a Celebrity, But You Could Still Get Hacked
In 2016, there’s a ‘who’s who’ of A-list celebrities. No, it’s not who was invited to the Academy Awards or...