Featured Blogs
How to Protect Three Common IoT Devices in 2019
It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will...
Kicking off CES 2019 with New Security Solutions and Collaborations
Today, we at McAfee are announcing some exciting new security solutions and integrations at CES in Las Vegas. For those...
Do Your Kids Love Gaming? Know How to Protect Them from A Cyberattack
Fortnite, Call of Duty Black Ops 4, Red Redemption 2, Spiderman, and Assassin’s Creed: Odyssey. If you are the parent...
Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind...
What Parents Need to Know About Virtual & Augmented Reality
You’ve probably heard the buzz around Virtual Reality (VR) and Augmented Reality (AR) and your child may have even...
The #1 Gift Parents Can Give Their Kids This Christmas
You won’t see this gift making the morning shows as being among the top hot gifts of 2018. It won’t make your...
Rogue Drones Cause Gatwick Airport to Close for Over 30 Hours: More on This Threat
As the Internet of Things works its way into almost every facet of our daily lives, it becomes more important...
Cybercriminals Disguised as Apple Are After Users’ Personal Data
With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends...
How to Get Technology Working for You This Christmas
Harnessing the power of the internet and technology this Christmas may just be what you need to get over this...
Fake Apps & Banking Trojans Are Cybercriminal Favorites
Today, we are all pretty reliant on our mobile technology. From texting, to voice messaging, to mobile banking, we have...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
McAfee Labs Threats Report Examines Cybercriminal Underground, IoT Malware, Other Threats
The McAfee Advanced Threat Research team today published the McAfee® Labs Threats Report, December 2018. In this edition, we highlight...
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...
Can Hackers Make Drones Drop out of the Sky?
While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more and more popular....
Holiday Rush: How to Check Yourself Before Your Wreck Yourself When Shopping Online
It was the last item on my list and Christmas was less than a week away. I was on the...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...
Why I Bring My Authentic Self to Work at McAfee
By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started...
How to Stay Secure from the Latest Volkswagen Giveaway Scam
You’re scrolling through Facebook and receive a message notification. You open it and see it’s from Volkswagen, claiming that the...
How To Help Your Teen Organise a Party Online Without It Becoming a Public Spectacle
Teen Parties and Instagram. If your teen is keen to have a party, I can guarantee you that they will...
‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure
This post was written with contributions from the McAfee Advanced Threat Research team. The McAfee Advanced Threat Research team...
12 Days of Hack-mas
2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered...
Helping Kids Deal with the Digital Rejection of ‘Ghosting’
Rejection is the unspoken risk that is present when we enter into any relationship be it a friendship or a...
Attention Red Dead Redemption 2 Players: Dodge This New Download Scam
Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game...
Avoid Falling Prey to Online Shopping Bait This Festive Season
For a moment, I thought this crazy friend of mine had finally lost it. She was staring at her laptop...
Are Your Online Photos Sharing More Than You Think?
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think...