Featured Blogs
How I try to live safer…
This blog was written by Scott Montgomery, McAfee’s previous vice president and chief technology officer of public sector. My McAfee...
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
How I Seized McAfee’s Opportunities to Realize My Potential
This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...
How I Live Safe: 3 Tips for Staying Secure Online
As a security professional, online safety is always on my mind. Especially when I’m using my personal devices, rather than...
How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles
In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
How Hackers are Using Heartbleed to Trick You into Infecting Your Computer
Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It...
How Googling Our Favourite Celebrities Is A Risky Business
Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...
