Securing Tomorrow. Today.

2021 Threat Predictions Report

New year, new threats! Hear from McAfee experts as they share our 2021 threat predictions and some of the challenges enterprises and consumers could face in the new year.

Read Blog
Family Safety

1-2-3: How to take a screen shot on your computer or mobile phone

There are some simple moves online that can save you an enormous amount of time. And when it comes to reporting abuses online nothing comes in handier than a screen shot, which is simply a photo file image of what’s in front of you on your computer screen or mobile ...

Cloud Security

Beyond Encryption: The 5 Pillars of Cloud Data Security

Given the recent influx of cyber-security attacks and the hubbub about the National Security Agency’s PRISM program, there is lot of talk about the importance of encryption to protect corporate data in the cloud. (PRISM is a clandestine data mining operation authorized by the U.S. government in which data stored ...

Family Safety Identity Protection Mobile and IoT Security

Why Should You be Careful When Using Hotspots or Free Wi-Fi?

These days, it’s not uncommon for us to connect to Wi-Fi wherever we go. In fact, we’ve come to expect there will be a Wi-Fi connection—at hotels, coffee shops, airports, and now even on some flights—pretty much everywhere. While the ability to connect just about anywhere is convenient, it also ...

Mobile and IoT Security

How Safe is Your Android Pin Code? A New Robot Can Easily Break In

By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time ...

Consumer Threat Notices

Mobile Bankers Beware: A New Phishing Scam Wants Your Money

As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to depositing checks, cybercriminals are finding new ways to take advantage of our growing reliance on our smartphones and tablets. Savvy scammers equipped with Photoshop & some computer programming skills are ...

McAfee Labs

Bitcoin Headlines Attract Malware Developers

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of 2013, we discuss this topic. The following timeline highlights recent events about this virtual currency. In our report we noted the growing interest in malware Bitcoin miners: malware that hijacks ...

Family Safety

How to Turn Off GPS on Your Child’s Phone

Mobile phone technology is amazing isn’t it? It’s so amazing it can track your child’s location (hey, they are called ‘smart phones’ for a reason). In fact, your family is likely uploading dozens of photos a week and inadvertently broadcasting your exact whereabouts. Both safety and privacy is put at ...

Consumer Threat Notices

Don’t Take a Bite out of that Apple Gift Card Scam

Good rule of thumb on the web: When it seems too good to be true, it probably is. Those ads on the right side of your web page, promising to give you a brand new iPad for absolutely free…probably a scam. The direct message on Twitter you received stating that ...

Mobile and IoT Security

BYOD: Balancing Convenience and Security

It lies next to you as you sleep, comes with you to work, rides home with you in your car and even travels with you on vacation. Your smartphone goes with you everywhere. Although convenient, the unprecedented connectivity we are experiencing culturally with mobile devices can create an equally daunting ...

Family Safety Identity Protection

What is a Zero-Day Threat?

The term “zero-day threat” may sound like the title of a hit film, but it’s definitely not that kind of thriller. A zero-day threat or attack is an unknown vulnerability in your computer or mobile device’s software or hardware. The term is derived from the age of the exploit, which ...

Subscribe to McAfee Securing Tomorrow Blogs