Featured Blogs
How To Help Your Family Protect Their Online Data
Whether you’re standing around the water cooler at work, waiting for your kids at the school gate or sitting around...
How To Make Security Easy
You flick through some reels and an ad for “a more private phone” crops up. You scroll through your news...
Unwrapping Some of the Holiday Season’s Biggest Scams
Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their...
Fake Security App Found Abuses Japanese Payment System
Authored by SangRyol Ryu and Yukihiro Okutomi McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment users in...
McAfee Personal Data Cleanup: Your Partner in Living a More Private Online Life
Do yourself a favor: Open a new browser tab and head to your search engine of choice. Type in your...
What is Antivirus and What Does It Really Protect?
Authored by Dennis Pang What is antivirus? That’s a good question. What does it really protect? That’s an even better...
Watch Out for These 3 World Cup Scams
What color jersey will you be sporting this November and December? The World Cup is on its way to television...
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...
Why Everyone Needs a VPN
You may hear corporate cybersecurity experts hail the benefits of a VPN, or a virtual private network, to keep company...
What Is Internet Security?
Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Microsoft’s Edge over Popups (and Google Chrome)
Following up on our previous blog, How to Stop the Popups, McAfee Labs saw a sharp decrease in the number...
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
What Is Bloatware and How Can It Impact Security?
The joy of purchasing a new device is liberating. Now you can work, learn, and play faster — along with...
How to Remove Your Personal Information From the Internet
Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...
Don’t Get Caught Offsides with These World Cup Scams
Authored by: Christy Crimmins and Oliver Devane Football (or Soccer as we call it in the U.S.) is the most...
How Cyberbullying Looks In Australia in 2023
There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...