Featured Blogs
Employees Share Stories Working in Award–Winning Cork Office
“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
On World Health Day, Give Your Children the Key to Good Digital Health
My morning walk route takes me past a school that usually has its assembly at 7:00 am. I catch glimpses...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
Emilia Clarke Is the Most Dangerous Game of Thrones® Celebrity
The net is dark and full of terrors, especially for fans of HBO’s popular show Game of Thrones®. As followers...
Teen Texting Slang (and Emojis) Parents Should Know
What adults call texting, kids call talking. They talk on their phones via chat, social comments, snaps, posts, tweets, and...
ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty
Cloud Technology Trends In this episode, we’ll hear from Wayne Anderson, Enterprise Security Architect at McAfee and Dan Flaherty from...
The GPS Rollover Bug: 3 Tips to Help You Avoid Phishing Scams
Today, users are extremely reliant on our GPS devices. In fact, we’re so reliant on these devices that map features...
10 Ways to Help Your Family Break Bad Tech Habits
A new study from Pew Research confirms our collective hunch that 95% of teens now report they have a smartphone...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
How to Make Sure Spring Break Doesn’t Wreck Your Digital Rep
Spring Break 2019 is in full swing, which means high school and college kids have hit the road determined to...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...
Smart home safety tips
Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected...
McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day
By Karla, Digital Media Specialist During the month of March, we are thrilled to support International Women’s Day, on March...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...