Featured Blogs
10 Ways to Help Your Family Break Bad Tech Habits
A new study from Pew Research confirms our collective hunch that 95% of teens now report they have a smartphone...
The GPS Rollover Bug: 3 Tips to Help You Avoid Phishing Scams
Today, users are extremely reliant on our GPS devices. In fact, we’re so reliant on these devices that map features...
ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty
Cloud Technology Trends In this episode, we’ll hear from Wayne Anderson, Enterprise Security Architect at McAfee and Dan Flaherty from...
Teen Texting Slang (and Emojis) Parents Should Know
What adults call texting, kids call talking. They talk on their phones via chat, social comments, snaps, posts, tweets, and...
Emilia Clarke Is the Most Dangerous Game of Thrones® Celebrity
The net is dark and full of terrors, especially for fans of HBO’s popular show Game of Thrones®. As followers...
What’s in Your IoT Cybersecurity Kit?
Did you know the average internet-enabled household contains more than ten connected devices? With IoT devices proliferating almost every aspect...
On World Health Day, Give Your Children the Key to Good Digital Health
My morning walk route takes me past a school that usually has its assembly at 7:00 am. I catch glimpses...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
Employees Share Stories Working in Award–Winning Cork Office
“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork...
IoT Zero-Days – Is Belkin WeMo Smart Plug the Next Malware Target?
Effective malware is typically developed with intention, targeting specific victims using either known or unknown vulnerabilities to achieve its primary...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. While most of...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
McAfee ATR Team Discovers New IoT Vulnerability in Wemo Insight Smart Plugs
*This blog is originally from August 2018 and was updated April 2019* From connected baby monitors to smart speakers —...
Here’s a Codicil to Add to Your Will – Disposal of Your Digital Assets
Codicil to Add to your Will – Disposal of Your Digital Assets We were still in shock over the sudden...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’
As adults, we know the importance of strong passwords, and we’ve likely preached the message to our kids. But let’s...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
It’s World Password Day – Give your Passwords an Overhaul!
How much of your personal data is stored online? Well, if you are anything like the ‘average Jo’ – the...
Protect Your Digital Life: Why Strong Passwords Matter
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was...
What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation
Gary Davis is now a regular contributor on the Tech Nation podcast! In this episode, Gary Davis educates that phishing...
What Would Yoda Do? 5 Tips to Raising a Mindful Digital Jedi
A Jedi, from the epic Star Wars films, is a warrior who fights for the greater good. Jedi are set...
#Verified — Worth the Risk?
In the social media world, a little blue checkmark next to a username is a sought-after status symbol. Celebrities, global...
Avoid a Security Endgame: Learn About the Latest “Avengers” Scam
Marvel Studio’s $2.2 billion box-office hit “Avengers: Endgame” has quickly risen to the second-highest grossing film of all time in...
Saving Summer: 5 Strategies to Help Reign In Family Screen Time Over Break
It’s the most wonderful time of the year — for teachers and lifeguards. For everyone else (parents) we have a...
On Mother’s Day, Show Your Love for Your Mom by Introducing Her to Helpful Apps
A mobile chat with my mother usually goes off like this: “Hello! Can you hear me! I am very busy...