Featured Blogs
How To Secure Your Mobile Devices
As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...
Medical Care From Home: Telemedicine and Seniors
For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve...
What Makes My Passwords Vulnerable?
Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
The First Smartphone for Free-Ranging Kids
The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids....
Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee...
What is GPS spoofing?
Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point...
ST21: DB Cybertech with Tranel Hawkins & Ben Farber
Security Innovation Alliance Explained McAfee’s Senior Manager of Business Development, Tranel Hawkins and DB Cybertech’s Chief Data Scientist & Product...
How to Protect Your Smart Cameras and Wi-Fi Baby Monitors
People who use devices like smart cameras and Wi-Fi-enabled baby monitors should strongly consider taking the following steps to protect...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
What Security Means to Professionals
What Security Means to Professionals Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
ScamsWeek2020
Here’s How to Be Yourself and NOT let a Scammer Be You! If you hadn’t truly embraced the incredible benefits...
Back-to-School: Could Your Remote Learner Be Cyber Cheating?
Back-to-School: Could Your Remote Learner Be Cyber Cheating? As families across the country ramp up for the new school year,...
Back-to-School: Prepping Your Tech for Learning Pods or Micro School
Back-to-School: Prepping Your Tech for Learning Pods or Micro School With a new academic year starting up, the look of...
On Drovorub: Linux Kernel Security Best Practices
Intro In a U.S. government cyber security advisory released today, the National Security Agency and Federal Bureau of Investigation warn...
How to Date Safely Online
If you are a young person looking for your ‘special someone’ then 2020 would have seriously cramped your style. Whether...
How To Secure Your Car’s Computer
Just like any other technological device, car computer systems aren't immune to cyber threats. Cybersecurity attacks on cars can pose serious safety threats and privacy issues.
Vulnerability Discovery in Open Source Libraries Part 1: Tools of the Trade
Executive Summary Open source has become the foundation for modern software development. Vendors use open source software to stay competitive...