Featured Blogs
What To Do If Your Data Is Stolen
If you’re like most people, you share your personal information with a number of companies and service providers, from banks...
What to Do If You Book a Hotel or Airbnb and It Turns Out to Be a Scam
Summer vacation season is upon us, and millions of families are booking accommodations for their dream getaways. But with the...
What the Mobile-Born Mean for IoT and Cybersecurity
Since before they knew how to walk, Gen Z – or the mobile-born generation – has had a wealth of...
What the FBI Wants You to Know About the Latest Phishing Scheme
What’s worse than a surprise call from a law enforcement official telling you to pay a fine or be forced to...
What Strategic Engagement Can Do for You – Americas Partner Awards
Last night at the McAfee Americas Partner Summit we recognized elite performance in our channel by handing out our annual...
What Should the Consequences Be for a Teens’ Digital Slip-Up?
Usually the first question I get from panicked parents who just found something shocking on their child’s phone is, “what...
What Should I do If My Phone Gets Stolen or Lost?
Before your phone gets lost or stolen, put some basic steps in place. You’ll want to act quickly, so preparation...
What Security Means to Professionals
What Security Means to Professionals Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
What Security Means to Families
What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is...
What Security Means to Elders
What Security Means to Elders Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
What Personal Data Do Companies Track?
Private tech companies gather tremendous amounts of user data. Understand what information is being collected by tech companies, how it’s being used, and how you can protect your privacy online.
What Parents Need to Know About Virtual & Augmented Reality
You’ve probably heard the buzz around Virtual Reality (VR) and Augmented Reality (AR) and your child may have even...
What Parents Need To Know About TikTok’s New Screen Time Limits
Social media platforms often get a hard time by us parents. But a recent announcement by TikTok of industry first...
What Parents Need to Know About the Popular App Mappen
Kids love their apps but in their excitement to download the new ones, app safety often falls straight off their...
What Parents Need to Know about Popular Video, Audio Apps
If you hear laughing, dancing, goofiness, and a lead choreographer barking commands coming from the next room, chances are your...
What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...
What Parents Need to Know About KIK Messenger App
We write a lot about new apps on this blog because apps are hot in the very mobile teen world....
What MWC 2019 Shows Us About the Future of Connectivity
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress...
What Mobile Users Should Know About Heartbleed: Free McAfee Android App
By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using...
What Master Key? – Android Signature Bypass Vulnerability
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on...
What Makes My Passwords Vulnerable?
Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.
What Leads a Child to Connect with Strangers Online?
At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity thieves found its...
What I’m Thankful for This Year: Combining Passion & Career
By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program...
What It Takes for Security in the Internet of Things
The next time you buy a car, chances are, it’ll be connected to your phone. Maybe your next refrigerator, thermostat,...
What Is the CurveBall Bug? Here’s What You Need to Know
Today, it was announced that researchers published proof of concept code (essentially, an exercise to determine if an idea is a reality) that exploits a recently patched vulnerability in...
What is ‘Covert Redirect’ and Should You be Worried?
When Heartbleed struck in April, it shook the Internet to its core in an almost literal sense: the vulnerability, which...
What is Wardriving?
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...