Featured Blogs
Holiday Challenge: How Serious Are You About Curbing Your Screentime?
I tinkered with the idea of signing off Facebook for the holidays. I even wrote the popular “I’m unplugging for...
Hold onto Your Phone, and Your Wallet – The Top Five Text Scams
Getting a text message is a lot like someone calling out your name. It’s tough to ignore. Delivery notifications, messages...
High-Tech & Hackable: How to Safeguard Your Smart Baby Devices
It’s just about as creepy as it gets: A hacker breaking into a smart device in your baby’s nursery. The...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
Hidden Data Economy Report Exposes Price Points for Stolen Data
McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being...
Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant
This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales. On February 28, the McAfee Advanced...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
Here’s What You Need to Know About Your Data Privacy in 2020
The end of 2019 is rapidly approaching, and with the coming of a new year comes the perfect opportunity to...
Here’s What You Need To Know About Botnets
In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded...