Featured Blogs
How a VPN Can Make Your Time Online More Private and Secure
What is a VPN (virtual private network)? And how can it make your time online more secure—and a little more...
How a Tech Expert Lost $13,000 to a Job Scam
Sam M. has spent more than 20 years building websites, testing systems, and managing technology projects. He knows code, he...
How a Single Password Triggered the Business Insider Breach
When it comes to cyberattacks, publicity is a magnet. But what happens when news publications themselves become targets? One of...
How a Group of McAfee Team Members Helped Change the Lives of Critically Ill Children
The generosity and kindness displayed by team members across McAfee is one major factor that makes up the incredible culture of the company....
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...
How a Close Relative Lost $100,000 to an Elder Scam
Written by James Schmidt Editor’s Note: We often speak of online scams in our blogs, ones that cost victims hundreds...
How a Backpack Stuffed with Spy Tech Can Pry into WhatsApp
We use backpacks to carry our portable technology. But now they can carry a new technology that gets inside those...
How 2020 Helped Parents Understand Their Kids’ Digital Lives
How 2020 Helped Parents Understand Their Kids’ Digital Lives Over the last 12 months, technology has featured in our lives...
How 2020 Has Shaped The Way We Live Our Lives
How 2020 Has Shaped The Way We Live Our Lives I’ve had such a busy morning! I’ve hunted down my...
