Featured Blogs
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Economic Growth, Regulatory Relief & Consumer Protection Act: What Parents Should Know
When we think about credit cards, we usually think of our own – what we use them for, how our...
The Drone that can Fly and Spy on Your Smartphone
For many, the notion of a flying drone conjures an image of an unmanned airborne military surveillance machine, or a...
The Do You Knows of DDoS Attacks
“Where’s my phone?” In a blink of an eye, my home is suddenly flipped upside down—couch cushions overturned, drawers –...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...
The Dark Web: What Every Parent Should Know
Mention the Dark Web in conversation and groans will inevitably ensue. Most of us realise it is a dangerous part...
The Dark Web: A Definitive Guide
The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay...
The Dark Side of Gen AI
There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...
The Dark Side of Clickbait: How Fake Video Links Deliver Malware
Authored By Sakshi Jaiswal McAfee Labs recently observed a surge in phishing campaigns that use fake viral video links to trick users...
The Dangers of Walking and Talking
As safe drivers and responsible community members, I know we are all aware that you just can’t use your mobile...
The Dangers of Linking Your Apple ID to Financial Accounts
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
The Dangers of Artificial Intelligence
Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1
The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their...
The Collection #1 Data Breach: Insights and Tips on This Cyberthreat
As the cybersecurity landscape evolves to match new trends in technology, it’s important for consumers to prioritize the protection of...
The Cloning of The Ring – Who Can Unlock Your Door?
Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...
The Channel Transformation to Ascend
This blog was written by Richard Steranka. In our continued quest to become our customers’ #1 security vendor and our...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...
The Case for Your Security at CES 2023
As technology weaves itself into our lives in new and unexpected ways, some of it will get quite personal and...
The Busy Parents’ Guide to Keeping Your Kids Safe Online
As a busy mum of 4, I often feel that my brain is in overload. Too much information – not...
The Big Reason Why You Should Update Your Browser (and How to Do It)
The humble internet browser. Dutifully taking you the places you want to go online, whether that’s the bank, the store,...
The Best Way to Stay Safe While Gaming
When my boys were in the thick of their teen years (pre pandemic), bad mouthing their seeming gaming obsession was...