Featured Blogs
What is a Hacker?
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You...
Could Facebook Get a ‘Dislike’ Button? Why Parents Ought to Care
There’s revived discussion in the halls of Facebook about adding a ‘dislike’ button to the popular social network. In fact,...
XcodeGhost Pulled from App Store After a Good Scare: What to Know
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
Online Forums and Chronic Illness
Life can sometimes deal us a tough set of cards. Dealing with a chronic illness is no exception. The Australian...
Japanese Banking Trojan Shifu Combines Malware Tools
In recent weeks, McAfee Labs has analyzed a recently discovered banking Trojan that combines elements from multiple malware tools. Shifu...
The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance
Who doesn’t love to search for celebrities online? From red carpet photos, to clips of the latest fashion faux pas,...
Is Your App Conspiring to Make Your Private Information Public?
Apps! They help us make the most of our time and bring ease in our busy lifestyle with just a...
10 Tips to Help Boost Your Teen’s Selfie Safety IQ
More people accidentally die each year while taking selfies than die from shark attacks. Sounds like an urban legend, right?...
McAfee delivers Updates to its Comprehensive Android Optimization Solutioner
McAfee just released the latest update to its McAfee Battery Optimizer, a complete device optimization app that works with Android...
From the Ground Up: How the Cars of the Future Will Be Secured
Autonomous systems are doing wonders for us, whether it be in factory manufacturing or recommending where you go to get...
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
Hidden Data Economy Report Exposes Price Points for Stolen Data
McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being...
Making Online Safety a Priority for Our Tech-Savvy Children
The joy of parenthood! We offer our children the best opportunities to help them become happy, healthy, responsible and educated...
Chip and PIN Credit Cards: More Secure, But Not Perfect
Not too long ago I discussed a big change coming to your credit and debit cards—the Chip and PIN system....
10 Ways to Help Your Kids Deal with Digital Friction
Has your teen been a little moody lately, short-tempered, or even oddly quiet? Outside of the normal teen angst, there could...
Ransomware: an Insight to Financial Gain
This week, joint research on the CryptoWall Version 3 family was released by the Cyber Threat Alliance. In Lucrative Ransomware...
CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6: Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we...
Mobile Phone Etiquette
Nothing irritates me more than someone using their phone while talking to me – and it’s not because I think...
