Featured Blogs
Most Dangerous Celebrity 2020 Sweepstakes
McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT...
Cybersecurity Awareness Month: If You Connect It, Protect It
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
Convenience vs. Online Security: Have Your Cake and Eat It Too
Convenience vs. Online Security: Have Your Cake and Eat It Too We live in a world where convenience is king....
Securing Space 4.0 – One Small Step or a Giant Leap? Part 1
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Do the Benefits of Bitcoin Outweigh the Risks?
Cryptocurrencies like Bitcoin are the future of tomorrow’s digital payment system—or are they? The same benefits that make them a popular choice with online users have also made them popular amongst online thieves, sparking a wave of ransomware attacks in the last few years. This begs the question: do the ...
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Why Should You be Careful When Using Hotspots or Free Wi-Fi?
The ability to be connected anywhere, anytime is extraordinary, but it also presents a significant security concern. Unsecured Wi-Fi networks can expose our personal and sensitive data to potential hackers.
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will...
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...
8 Ways to Help Senior Adults Stay Safe Online These Days
8 Ways to Help Senior Adults Stay Safe Online These Days Technology has come in handy for most of us...
Stay Connected & Protected: Weaving Security Into Our Social Media Habits
Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we...
Career change? Cybersecurity companies are hiring.
Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...
ST22: Attivo Networks with Greg Vinson & Tushar Kothari
Threat Solutions McAfee’s Global Business Development Manager, Greg Vinson and CEO of Attivo Networks, Tushar Kothari discuss the solutions to...
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote In the early days of the COVID-19 pandemic, another...
Before You Download: Steer Clear of Malicious Android Apps
Cybercriminals like to get in on a good thing. Case in point, mobile apps. We love using apps and they love making bogus ones—malicious apps designed to harm phones and possibly the person using them. The good news is that there are ways you can spot these imposters. These six ...
Smart TVs and Refrigerators Used in Internet-of-Things Cyberattack
In this article, we’ll explore what happened when hundreds of thousands of these devices were roped into an extensive Internet-of-Things (IoT) cyber attack, how it happened, and how you can protect your smart devices to stay safe.
How Safe Is Your Android PIN Code?
Your Android PIN code is a critical aspect that protects your phone data from unauthorized access. But how safe is this four-digit code? This article aims to demystify this question and offers a comprehensive guide on the safety of Android PIN codes.
A Detailed Guide on Cyberbullying
Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. Therefore, it's crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.
Could Your Kids Spot an Online Predator?
As parents, caregivers, and mentors, it's our responsibility to educate and guide our children about the virtual perils that lurk within their screens. An essential part of this is continuous communication, ensuring they understand the gravity of the situation and can recognize the deceptive tactics employed by these predators
Celebrities Are Lures For Scammers
Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims.
If You Give A Hacker Your Email Address…
Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.
Staying Safe While Working Remotely
In the shadow of the COVID-19 pandemic, workplaces worldwide have undergone a seismic shift towards remote working. This article aims to provide a comprehensive guide on how you, as an employee, can augment your cybersecurity measures and stay safe when working remotely.
Evolving Security Products for the new Realities of Living Life From Home
Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...
Can You Decode Your Teen’s Texting Language?
It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like...
Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers
2020 has propelled us into a new digital reality – one where we are reliant on technology to help us...
Spyware: A Major Identity Theft Threat
Spyware is a type of malicious software that collects information about users without their knowledge. It can track every action, from keystrokes to browsing habits, thus presenting a grave threat to user privacy and security.