Featured Blogs
Securing Data Together
At McAfee, we value keeping customers at the core of our business. We deeply care about serving our clients and...
Ileana D’Cruz Tops ‘McAfee Most Sensational Celebrity’ List for 2018
We Indians love our movies and actors and voraciously consume all Page 3 gossip tidbits on them. Our love affair...
McAfee’s Most Dangerous Celebrities 2018: Ruby Rose Takes Center Stage
Every rose has its thorn, right? Apparently, the same goes for actress Ruby Rose, as her newfound popularity from “Orange...
#CyberAware: Will You Help Make the Internet a Safe Place for Families?
Don’t we all kinda secretly hope, even pretend, that our biggest fears are in the process of remedying themselves? Like...
Facebook Announces Security Flaw Found in “View As” Feature
Another day, another Facebook story. In May, a Facebook Messenger malware named FacexWorm was utilized by cybercriminals to steal user...
Understanding Your Kid’s Smart Gadgets
When people think about IoT devices, many often think of those that fill their homes. Smart lights, ovens, TVs, etc....
Netflix Users: Don’t Get Hooked by This Tricky Phishing Email
If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming...
‘McAfee Labs Threats Report’ Highlights Cryptojacking, Blockchain, Mobile Security Issues
As we look over some of the key issues from the newly released McAfee Labs Threats Report, we read terms such as voice assistant, blockchain, billing fraud, and cryptojacking.
5 Ways to Protect Your Finances Online
Financial companies continue to innovate with their online products and services, bringing conveniences for customers, but challenges when it comes...
5 Reasons Why Strong Digital Parenting Matters More than Ever
As a parent raising kids in a digital culture, it’s easy to feel at times as if you have a...
Announcing McAfee’s Evolved Consumer Product Portfolio
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In...
Cyber Threat Alliance Releases Analysis of Illicit Cryptocurrency Mining
In response to the explosive increase in cryptomining campaigns in Q4 2017, the Cyber Threat Alliance has formed a cryptomining subcommittee to assess the threat.
Mobile and Digital Payments: Worth the Risk?
Thanks in part to the convenience that our mobile devices provide for us, much of the world operates now on...
Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware
Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent...
Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns
We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their...
Fortnite: Why Kids Love It and What Parents Need to Know
Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded...
Safari and Edge Browser Users: This Flaw May Help Hackers Hijack Your Internet Activity
A browser is our connection to the world wide web – it allows us to access websites, gain information, make...
Inside a Modern-Day Smart Home
Ever wonder how the Internet of Things (IoT) first began? Often regarded as the first IoT device, John Romkey created...
Digital Literacy Decoded – Time to Reprise Our Roles as Digital Citizens
Celebrated every year on September 8, this year’s theme for International Literacy Day focused on “Literacy and Skills Development.” And...
Could the Photos You’re Sharing Online Be Putting Your Child at Risk?
Confession time. I’m a mom that is part of the problem. The problem of posting photos of my kids online...
A Look Back at the Equifax Data Breach, One Year Later
WannaCry, Petya, and Equifax first come to mind when you think of the most impactful cyber events in recent years,...
Salute to Teachers – The Architects of Tomorrow’s Digital India
The digital whiteboards have long replaced the squeaky blackboards, while emails and text messages are replacing messages pinned on the...
Trending: IoT Malware Attacks of 2018
Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large...
How Safe is Your Child’s Personal Data at School?
Right about now, most kids are thinking about their chemistry homework, the next pep rally, or chiming in on their...
Seamless Security for the Connected Consumer
Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user’s arsenal of personal devices. We...
The Economic Growth, Regulatory Relief & Consumer Protection Act: What Parents Should Know
When we think about credit cards, we usually think of our own – what we use them for, how our...
Attention Fortnite Fans: The New Android App Was Found Containing a Massive Vulnerability
Back in June, Fortnite fans, hopeful for an Android version of the game, were teased with fake apps, which were...