Featured Blogs
The Rise and Risks of AI Art Apps
Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...
The Reviews are In—McAfee+ Earns Top Marks from Review Sites
We created McAfee+ so people can be safe and feel safe online, particularly in a time where there’s so much...
The Reddit Data Breach: What Consumers Need to Know
With the tagline, “giving you the best of the internet in one place,” Reddit is a popular website designed for...
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week...
The Privacy Problems with Mobile Messaging Apps
When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your...
The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks
Cybercrime has a price. One that more and more business owners find themselves paying. The costs push well into the...
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and...
The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes...
The Parent’s Cybersafety Checklist for Back To School
Sometimes I am not sure which is more stressful – Christmas, or getting kids ready for the school year. So...
The Optus Data Breach – Steps You Can Take to Protect Yourself
Optus, one of Australia’s largest telecommunications carriers, reported news of a data breach that may have compromised the information of...
The One Twitter Feature Every Parent Should Know How to Use
Sometimes as a parent you have to put on the war paint and do a little extra recon online. After...
The Old, The New, and The Future: McAfee Labs September Threats Report
As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our...
The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
The New Intern-Net
By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to...
The Mysterious, Ominous Dark Web: A Primer for the Rest of Us
These past weeks have not been kind to those seeking privacy for conducting illicit activities. The Ashley Madison hack came to...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that...
The Most Impersonated Brands in Holiday Shopping, Ranked
Scammers aren’t worried about ending up on the naughty list. If anything, they’re doubling down in 2025. This year, scammers are impersonating major brands with startling accuracy,...
The Most Hackable Christmas Gifts of 2016 – Are You Prepared?
I’ve decided that 2016 will be a calm and collected Christmas in our house. I’m saying NO to last minute...
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
The Mobile Web vs. Native Apps
The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The McAfee Adventures of a Middle School Teacher
By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. –...
