Featured Blogs
Microsoft’s Edge over Popups (and Google Chrome)
Following up on our previous blog, How to Stop the Popups, McAfee Labs saw a sharp decrease in the number...
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
What Is Bloatware and How Can It Impact Security?
The joy of purchasing a new device is liberating. Now you can work, learn, and play faster — along with...
How to Remove Your Personal Information From the Internet
Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
Don’t Get Caught Offsides with These World Cup Scams
Authored by: Christy Crimmins and Oliver Devane Football (or Soccer as we call it in the U.S.) is the most...
How Cyberbullying Looks In Australia in 2023
There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...
A Guide to Remove Malware From Your iPhone
Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated...
How much of your personal info is available online? A simple search could show you plenty.
What you paid for your home, who lives there with you, your age, your children, your driving record, education, occupation,...
Less Is More: Why One Antivirus Software Is All You Need
Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
How To Stay Safe from Phishing Attacks
When you’re online, the world is at your fingertips. You can do amazing things like stream the latest movies while they’re still in theaters! Or...
Ransomware Masquerading as Microsoft Update Targets Home Computers
A new ransomware threat is currently sweeping its way across home computers. And what’s making it extra tricky is that...
Protect yourself from scams this Diwali
It’s Diwali, a time of light, a time of togetherness, and, of course, a time of celebration. Along with Diwali...
What Is Smishing and Vishing, and How Do You Protect Yourself
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
What Are Tailgating Attacks and How to Protect Yourself From Them
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...
How to Tell Whether a Website Is Safe or Unsafe
It’s important to know that not all websites are safe to visit. In fact, some sites may contain malicious software...
New Malicious Clicker found in apps installed by 20M+ users
Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many...
Toyota Data Breach Exposes Customer Data – What You Can Do to Protect Yourself
Automobile manufacturer Toyota recently announced a data breach that may have exposed the emails of up to 300,000 customers for...
True Security Requires a Holistic Approach
In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...
57 Million Users Compromised in Uber Leak: Protect Your Digital Privacy and Identity
“I’ll just Uber home.” Who hails a taxi anymore? These days, city streets are full of double-parked sedans with their...
The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at...
See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with...
4 Easy Things You Can Do Today to Improve Your Cybersecurity
Happy Cybersecurity Awareness Month! Every October, the National Cybersecurity Alliance selects a theme around which to publish extensive awareness...
McAfee Secure VPN: Now with WireGuard for Faster Speeds and Enhanced Stability
McAfee’s Secure VPN now supports the WireGuard protocol, which gives you faster connection speeds plus enhanced stability and security. WireGuard...
The Optus Data Breach – Steps You Can Take to Protect Yourself
Optus, one of Australia’s largest telecommunications carriers, reported news of a data breach that may have compromised the information of...
Credit Lock and Credit Freeze: Which Service Is Best for You? Both!
Are you hoping to buy a house or apply for a car, personal, or business loan at some point? A...