Featured Blogs
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week...
The Privacy Problems with Mobile Messaging Apps
When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your...
The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks
Cybercrime has a price. One that more and more business owners find themselves paying. The costs push well into the...
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and...
The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes...
The Parent’s Cybersafety Checklist for Back To School
Sometimes I am not sure which is more stressful – Christmas, or getting kids ready for the school year. So...
The Optus Data Breach – Steps You Can Take to Protect Yourself
Optus, one of Australia’s largest telecommunications carriers, reported news of a data breach that may have compromised the information of...
The One Twitter Feature Every Parent Should Know How to Use
Sometimes as a parent you have to put on the war paint and do a little extra recon online. After...
The Old, The New, and The Future: McAfee Labs September Threats Report
As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our...
The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
The New Intern-Net
By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to...
The Mysterious, Ominous Dark Web: A Primer for the Rest of Us
These past weeks have not been kind to those seeking privacy for conducting illicit activities. The Ashley Madison hack came to...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that...
The Most Hackable Christmas Gifts of 2016 – Are You Prepared?
I’ve decided that 2016 will be a calm and collected Christmas in our house. I’m saying NO to last minute...
 
    
 
                                 
                                 
                                