Featured Blogs
Protecting Your Privacy on Social Media
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But, the kind of...
Why Kids Use Secret Decoy Apps and Why Parents Should Care
Kids have been locking their diaries and hiding top secret shoe long before even Sandy Olssen had a crush on...
Android Devices Potentially Compromised by Judy App Weaknesses
We’ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a...
Misuse of DocuSign Email Addresses Leads to Phishing Campaign
DocuSign, which provides electronic signatures and digital transaction management, reported that email addresses were stolen by an unknown party on...
Helping Kids Understand the Foolishness and Consequences of Sexting
Sexting and teens. Nearly every week, the headlines reflect the attempt of citizens, educators, and lawmakers to tackle the question: What...
Curbing The Threat Of Fake Accounts
My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was...
Connected Vacations: Top Takeaways from Our Unplugging Survey
It’s June, which means the sun is shining, schools out, and it’s time for a family summer vacation! Whether you’re...
How to Avoid Falling for a Fake Ad Scam
They say impersonation is the sincerest form of flattery, but when it comes to the internet, copy cats don’t always...
The 5-Minute Parents’ Guide To Snapchat
OK – we’ve all heard about Snapchat and know that our kids love it. But how many of us really...
Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation....
We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks in the news...
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her Instagram page. However,...
McAfee Discovers Pinkslipbot Exploiting Infected Machines as Control Servers
This blog was written by Sanchit Karve. McAfee Labs has discovered that banking malware Pinkslipbot (also known as QakBot/QBot) has...
Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages...
The #1 Skill All Parents Should Be Homeschooling Kids in This Summer
Dear Mr. and Mrs. Smith, your child’s decision to post inappropriate content online is why we’ve decided to rescind our...
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane...
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco...
How to Protect Your Child from Identity Theft in 8 Easy Steps
With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor...