Featured Blogs
Meltdown and Spectre Aren’t Done Just Yet – New Malware Uses Exploits to Attack Browsers
We kicked off 2018 with two powerful new exploits: Meltdown and Spectre. And since the discovery of Meltdown and Spectre...
Today’s Connected Cars Vulnerable to Hacking, Malware
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Teen Texting Slang (and Emojis) Parents Should Know
What adults call texting, kids call talking. They talk on their phones via chat, social comments, snaps, posts, tweets, and...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
Here’s How the California Consumer Privacy Act Will Affect You
On May 25, 2018, the European Union implemented a new privacy legislature called the General Data Protection Regulation or GDPR....
Is It Time to Overhaul Your Relationship with Technology?
Editor’s Note: This is part I of a series on Digital Minimalism in 2020. When Steve Jobs introduced the iPhone...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
Help Kids Steer Clear of Cyberbullies During Summer Break
As we all look forward to the sunshine and freedom of summer, it’s important to remember that not all elements...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
How Does Jailbreaking Or Rooting Affect My Mobile Device Security?
In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...