Featured Blogs
The Future of IoT: What to Expect From Our Devices This Year
The beginning of the new year is always an exciting time for consumer technology enthusiasts. Business leaders, pioneers and forward-thinking...
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...
The Future of Cyber Safety: Could Artificial Intelligence Be The Silver Bullet?
Stay Safe Online Week 2017 Cyber safety: outsourcing to experts makes such sense! Like most multi-tasking millennium mums, I’m a...
The Four Rs of Personal Mobile Security
Smartphones have enabled a whole new digital world, where apps are gateways to just about any service imaginable. However, like...
The Four Mobile Security Threats You Need to Know About
“Florals for Spring, groundbreaking.” There are few movie quotes that continue to resonate as much as the line delivered by...
The First Smartphone for Free-Ranging Kids
The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids....
The Feeling of Safety with McAfee+
Safety has a feeling all its own, and that’s what’s at the heart of McAfee+. We created McAfee+ so people...
The Feeling of Safety
The internet’s greatest feat? Fundamentally shifting how we live. Once a revelation, it quickly set our long-standing beliefs about how...
The Facebook Hack That Lets Strangers Spy on Your Sleep Patterns
Many of us check Facebook first thing in the morning. We’ve all been guilty of browsing away in bed before...
The Facebook Cull and Why You Should Embrace It!
So, how many friends do you have on Facebook? Do you really know them or were they just a passing...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Economic Growth, Regulatory Relief & Consumer Protection Act: What Parents Should Know
When we think about credit cards, we usually think of our own – what we use them for, how our...
The Drone that can Fly and Spy on Your Smartphone
For many, the notion of a flying drone conjures an image of an unmanned airborne military surveillance machine, or a...
The Do You Knows of DDoS Attacks
“Where’s my phone?” In a blink of an eye, my home is suddenly flipped upside down—couch cushions overturned, drawers –...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...
The Dark Web: What Every Parent Should Know
Mention the Dark Web in conversation and groans will inevitably ensue. Most of us realise it is a dangerous part...
The Dark Web: A Definitive Guide
The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay...
The Dark Side of Gen AI
There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...
The Dark Side of Clickbait: How Fake Video Links Deliver Malware
Authored By Sakshi Jaiswal McAfee Labs recently observed a surge in phishing campaigns that use fake viral video links to trick users...
The Dangers of Walking and Talking
As safe drivers and responsible community members, I know we are all aware that you just can’t use your mobile...
The Dangers of Linking Your Apple ID to Financial Accounts
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
The Dangers of Artificial Intelligence
Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet...
