Featured Blogs
12 Days of Hack-mas
2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered...
‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure
This post was written with contributions from the McAfee Advanced Threat Research team. The McAfee Advanced Threat Research team...
How To Help Your Teen Organise a Party Online Without It Becoming a Public Spectacle
Teen Parties and Instagram. If your teen is keen to have a party, I can guarantee you that they will...
How to Stay Secure from the Latest Volkswagen Giveaway Scam
You’re scrolling through Facebook and receive a message notification. You open it and see it’s from Volkswagen, claiming that the...
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...
Holiday Rush: How to Check Yourself Before Your Wreck Yourself When Shopping Online
It was the last item on my list and Christmas was less than a week away. I was on the...
Can Hackers Make Drones Drop out of the Sky?
While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more and more popular....
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...