Featured Blogs
The Case for Your Security at CES 2023
As technology weaves itself into our lives in new and unexpected ways, some of it will get quite personal and...
New Year, New You: Start Fresh With McAfee Protection Score
Are you an online oversharer? Do you give your full birthday to all your online shopping accounts? Have a few...
How To Distinguish Between Online Protection Software and Antivirus
Authored by Dennis Pang Online protection software. Antivirus. The two words get used interchangeably often enough. But sure enough, they’re...
3 Tools to Round Out Your Privacy Protection Toolbox
It’s common practice to pull down the window shades at night. Homeowners invest in high fences. You may even cover...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re sending money with...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and...
How To Recover Your Identity After It Has Been Stolen
It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the...
Can Apple Macs get Viruses?
It’s a long-standing question. Can Apple computers get viruses? While Apple does go to great lengths to keep all its...
The Rise and Risks of AI Art Apps
Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...