Featured Blogs
It’s World Password Day – Give your Passwords an Overhaul!
How much of your personal data is stored online? Well, if you are anything like the ‘average Jo’ – the...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’
As adults, we know the importance of strong passwords, and we’ve likely preached the message to our kids. But let’s...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Here’s a Codicil to Add to Your Will – Disposal of Your Digital Assets
Codicil to Add to your Will – Disposal of Your Digital Assets We were still in shock over the sudden...
McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs
*This blog is originally from August 2018 and was updated April 2019* From connected baby monitors to smart speakers —...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...
Employees Share Stories Working in Award–Winning Cork Office
“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
On World Health Day, Give Your Children the Key to Good Digital Health
My morning walk route takes me past a school that usually has its assembly at 7:00 am. I catch glimpses...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
Emilia Clarke Is the Most Dangerous Game of Thrones® Celebrity
The net is dark and full of terrors, especially for fans of HBO’s popular show Game of Thrones®. As followers...
Teen Texting Slang (and Emojis) Parents Should Know
What adults call texting, kids call talking. They talk on their phones via chat, social comments, snaps, posts, tweets, and...
ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty
Cloud Technology Trends In this episode, we’ll hear from Wayne Anderson, Enterprise Security Architect at McAfee and Dan Flaherty from...
The GPS Rollover Bug: 3 Tips to Help You Avoid Phishing Scams
Today, users are extremely reliant on our GPS devices. In fact, we’re so reliant on these devices that map features...
10 Ways to Help Your Family Break Bad Tech Habits
A new study from Pew Research confirms our collective hunch that 95% of teens now report they have a smartphone...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...