Featured Blogs
How McAfee’s Paternity Leave Helped My New Family
By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K. Becoming a parent is a daunting experience for anyone. The sheer amount...
How McAfee’s Mentorship Program Helped Me Shine in My Career Journey
By: Anshu, Software Engineer “The mind is not a vessel that needs filling, but wood that needs igniting.”—Mestrius Plutarchus A...
How McAfee’s Inclusive Maternity Benefits Helped Me Thrive as a New Mom
By: Smriti, People Partner McAfee continues to recognize and celebrate hardworking mothers across our global workforce. We continue to advance in our workplace culture by offering policies and...
How McAfee is Adapting to the Mobile Landscape with New Partnerships and Innovation
Mobile World Congress (MWC) 2018 is finally upon us, and mobile and security providers from around the world are in...
How McAfee Embedded Security Helps Medical Device Manufacturers
The blog was written by Tom Moore. Like other Internet of Things (IoT) devices, medical equipment is a vulnerable attack...
How KRACK Threatens Wi-Fi’s Security Underpinnings and What It Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord...
How Keyless Entry Lets Cybercriminals Hack Your Connected Car
There’s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In...
How IoT is revolutionising the world of sport
This blog post was written by Nick Viney. When we think about the ‘Internet of Things’ (IoT) in sports and...
How iOS Malware May Snoop on Our Devices
Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t...
How I Wear My #McAfeePride
By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know,...
How I Use McAfee’s Volunteer Time Off to Help Lost Paws Find Homes
by Christine, Sales Operations, Plano Imagine sixteen paws, eight floppy ears and four wagging tails happily greeting you at the door—that’s...
How I try to live safer…
This blog was written by Scott Montgomery, McAfee’s previous vice president and chief technology officer of public sector. My McAfee...
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
How I Seized McAfee’s Opportunities to Realize My Potential
This post was written by Emmanuel Making the most of opportunities and putting in the work with an employer who...
How I Live Safe: 3 Tips for Staying Secure Online
As a security professional, online safety is always on my mind. Especially when I’m using my personal devices, rather than...
How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles
In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
How Hackers Bypassed an Adobe Flash Protection Mechanism
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security....
How Hackers are Using Heartbleed to Trick You into Infecting Your Computer
Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It...
How Googling Our Favourite Celebrities Is A Risky Business
Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...
How Free VPNs Come With a Price
The number of people who use VPNs (virtual private networks) continues to mushroom. Recent research shows that 46% of American...
How Fraudsters Are Fooling Users With This Proof of Vaccination Phishing Scam
You open your laptop and see an email from a healthcare organization that you don’t recognize. The subject line reads “URGENT –...
How Fraudsters Are Exploiting the Taylor Swift and Travis Kelce Engagement
When news of Taylor Swift and Travis Kelce’s engagement broke recently, fans around the world celebrated this real-life love story....
How Extremist Groups Target Teens Online
With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.
How Entertaining Ourselves at Home Has Become a Risky Business
Online entertainment is certainly having a moment. While we all stayed home and socially distanced, many of us filled our...
How Does Jailbreaking Or Rooting Affect My Mobile Device Security?
In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...
How Do Your Digital Assets Compare?
My Dad is in his mid 60’s and retired. And the man knows how to live. A day doesn’t go...
