Featured Blogs
McAfee Security Innovation Alliance 2020 MPOWER Awards
McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The 2020 awards recognize partners who...
2020 In Review: The Top 10 Most Popular Life at McAfee Blogs
2020 has been quite the year for many, and through it all, we’re reflecting on everything we are thankful for. This includes the incredible stories and invaluable perspectives that...
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...
Best Smart Home Devices for a Connected New Year
Like many of you, I spent a lot of time at home this year, but it came with an unexpected...
Additional Analysis into the SUNBURST Backdoor
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the...
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Putting Protection to The Test
Putting Protection to The Test This year has thrown a lot of challenges at us, and our digital lives were...
Online Shopping: The Dos and Don’ts
Internet shopping has become an integral part of our daily lives, providing convenience, variety, and easy price comparisons. However, with this convenience comes potential risks. This article explores the dos and don’ts of online shopping to help you navigate this virtual marketplace safely and effectively.
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected You wake up, log in to your Outlook, and...
Zooming with the Grandkids: Five Easy Video Chat Apps for the Holidays
Zooming with the Grandkids, Nieces, and Nephews: Five Free and Easy Video Chat Apps for the Holidays All the kids...
How to Fight Back Against Vishing and Smishing Attacks
With the advent of technology and the widespread use of mobile phones, scam calls and texts have become increasingly common. These annoying and invasive attempts to trick you out of your personal information can be frightening and frustrating. They often come in the form of ‘vishing‘ and ‘smishing‘ attacks. But ...
How To Protect Yourself from SMiShing Attacks
SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...
How Cybercriminals Are Shopping for Personal Data This Black Friday
While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...
Keeping Kids Safe from Online Threats
The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.
What is Social Engineering?
In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...
McAfee Team Members Share Their Virtual Onboarding Experiences
At McAfee, ensuring our new team members are well prepared and supported for their roles is a top priority. From...
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday The reality is beginning to hit: The holiday...
AI & Your Family: The Wows and Potential Risks
From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...
The Smart Home Security Guide
The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...
Spot Those Black Friday and Cyber Monday Shopping Scams
We’re not the only ones looking forward to the big holiday sales like Black Friday and Cyber Monday. Hackers are too. As people flock to retailers big and small in search of the best deals online, hackers have their shopping scams ready.
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
‘Sleigh’ Holiday Shopping by Protecting Your Online Security
‘Sleigh’ Holiday Shopping by Protecting Your Online Security And just like that, the holiday shopping season is among us! Like...
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your privacy has a price tag on it. Yet you have some say in all this. You can take several steps that can minimize the data trail that you create by going online. Put ...
How to Prevent Keyboard Snooping Attacks on Video Calls
Video conferencing has really taken off this year. With more people working and learning from home than ever before, video...
Thankful for broadband internet, and hopeful for much more
Thankful for broadband internet, and hopeful for much more Where would we be without our internet this year? We’ve shopped, worked, studied and taught, job hunted, and cared...
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.