Featured Blogs
How Valuable Is Your Health Care Data?
This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search...
How Using A VPN Could Save Your Summer
As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However,...
How USB Drives Were Recently Used to Hand-Deliver Malware
We all have unsolicited mail show up in our mailbox. Whether as advertisements or coupons, companies hope we view them...
How Typosquatting Scams Work
Typosquatting is when someone registers a web address that’s a misspelling of a known website — usually a popular one....
How to Wipe Out a Computer Virus
In this article, you’ll learn some of the signs that you may have a computer virus, and you’ll learn tips...
How to Win the Battle Against Deepfakes and Malware
As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked—AI also works on your side. It...
How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner
Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will...
How to Treat Your Family’s Personal Data Like Gold in a Hyper-Connected World
Tomorrow, January 28, is National Data Privacy Day. While that may not mean a lot to you at first glance, the...
How to Tell Whether a Website Is Safe or Unsafe
Something looks a little…sketchy. Is that website safe or unsafe? Nowadays, it can take a bit of work to...