Featured Blogs
Iran Cyber Threat Update
Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on...
Research Reveals Americans’ Perceptions of Device Security Amidst CES 2020
From the Lifx Switch smart switch to the Charmin RollBot to Kohler Setra Alexa-connected faucets, CES 2020 has introduced new...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
Where’s the Truth Online? How to Build Your Family’s Digital Discernment
Note: This is Part I of a series on equipping your family fight back against fake news online. Fake news...
Take Action This Data Privacy Day
We all know that data breaches have been on the rise, and hackers are finding clever, new ways to access...
Security Lessons From 2019’s Biggest Data Breaches
2019 already feels like it’s worlds away, but the data breaches many consumers faced last year are likely to have...
Spotting Fake News: Teaching Kids to be Responsible Online Publishers
Editor’s note: This is part II in a series on Fake News. Read part I, here. Kids today are not...