Featured Blogs
How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security
Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we’ve gone from seeing well-loved, but deceased, cultural...
Improve Protection Against Cyberattacks Through Shared Threat Intelligence
This blog post was written by Rick Simon. At the RSA Conference 2016 in San Francisco, Chris Young, GM and...
Malware Hides in Installer to Avoid Detection
At McAfee Labs we recently observed various threat families using the Nullsoft Scriptable Install System (NSIS). This practice is not...
Heads Up Parents. Gaming Could Help Your Kids Perform Better at School but Facebook Won’t!
Some days, I think gaming is a gift from the gods – a ‘time-out’ gift for tired, stressed parents. But...
Stepping Up to the Tech Training Challenge
The clock is counting down to the big annual Focus conference in Las Vegas, where McAfee will unveil a number...
The Four Mobile Security Threats You Need to Know About
“Florals for Spring, groundbreaking.” There are few movie quotes that continue to resonate as much as the line delivered by...
Is Zombie Scrolling Syndrome Zapping Your Child’s Health?
Congratulations, parent. Your kids survived the first few weeks of the new school year. Or did they? You may want...
When Voice Recognition Goes Wrong: YouTube Videos Can Say “Ok Google”
YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most...
Keep Your Data Safe While Unplugging on Vacation
When you are packing your bags for a long weekend break or a family holiday, do you pack all your...
5 Signs You’re ‘One of Those’ Clueless Parents Online
It’s a fact. This blog may not get a lick of traction. It goes against every SEO rule. There will...
Microsoft Discovers Malware in Word Files! Here’s What You Need to Know
Microsoft Word is omnipresent. Students use it for their academic careers and office workers, well, office workers pretty much live...
Techies Give Back at Tech Forum
This blog was written by Chance Hoover. Earlier this month, more than 100 channel partner engineers from across the Americas...
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a desirable target for...
The Android Photo Hack: A Picture Says a Thousand Commands
Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts...
The Busy Parents’ Guide to Keeping Your Kids Safe Online
As a busy mum of 4, I often feel that my brain is in overload. Too much information – not...
Plug with Caution! How to Stop Hackers from Stealing More than Battery Power
There’s nothing like that stressful moment when you look to your phone and see a red battery and a low...
6 Things to Monitor on Your Teen’s Instagram
Instagram is awesome — so awesome, in fact, it ranks in the top two social networks among teens. (Snapchat is...
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were...