Featured Blogs
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
Five Things I Don’t Like About Cloud Security for Homeowners (and One Thing I Do)…
For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just...
Five Reasons Why True Key Is Our Knight in Shining Armor
Has it ever happened to you that you tried to log into an account only to find that you seem...
First Smartphone: Are You Putting Cyberbullies Under the Tree This Year?
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer that keeps threats...
Finsta: What You Need to Know About Your Teen’s Fake Instagram Account
Creating a Finsta (fake Instagram) account on the popular photo platform, Instagram has become the norm for many teens. After...
Financial Losses from Tax Scams Top $1,000 on Average—and Gen Z is a Growing Target
Tax season is already stressful for many Americans, and to make matters worse, it’s also a golden opportunity for scammers....
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...