Featured Blogs
How Cyberbullying Looks In Australia in 2023
There’s no doubt that cyber bullying ranks towards the top of most parents ‘worry list’. As a mum of 4,...
How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family
Like stockbrokers watch the market, cybercriminals keep an eye on the public’s latest obsessions. And, once they spot a trend...
How Criminals Are Using AI to Clone Travel Agents and Steal Your Money
Your dream vacation could become a nightmare if you fall for these sophisticated AI-powered scams. The travel industry is experiencing...
How Chinese Cybercriminals Use Business Playbook to Revamp Underground
Preface Because of its longevity and technical sophistication, the Russian cybercriminal underground has long been the benchmark for threat researchers...
How Can We Stop ‘ROP’ Cyberattacks?
IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant...
How an Online Prank Had Countless Phones Dialing 911
Remember elementary school, when prank notes left on fellow students’ desks caused uproars of laughter? Those were golden days....
How AI PCs Are Optimizing Productivity Tools for Students
In today’s fast-paced educational environment, productivity is a key determinant of academic success. Enter AI PCs—computers enhanced with artificial intelligence...
How AI Deepfakes and Scams Are Changing the Way We Shop Online
As 89% of Americans plan to shop online during this holiday shopping season, many say they’re more concerned about being...
How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks
Last Friday, the biggest ransomware attack we’ve seen hit organizations everywhere, impacting more than 150 countries. It shut down a...
How a VPN Can Make Your Time Online More Private and Secure
What is a VPN (virtual private network)? And how can it make your time online more secure—and a little more...
How a Single Password Triggered the Business Insider Breach
When it comes to cyberattacks, publicity is a magnet. But what happens when news publications themselves become targets? One of...
How a Group of McAfee Team Members Helped Change the Lives of Critically Ill Children
The generosity and kindness displayed by team members across McAfee is one major factor that makes up the incredible culture of the company....
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...
How a Close Relative Lost $100,000 to an Elder Scam
Written by James Schmidt Editor’s Note: We often speak of online scams in our blogs, ones that cost victims hundreds...
How a Backpack Stuffed with Spy Tech Can Pry into WhatsApp
We use backpacks to carry our portable technology. But now they can carry a new technology that gets inside those...
How 2020 Helped Parents Understand Their Kids’ Digital Lives
How 2020 Helped Parents Understand Their Kids’ Digital Lives Over the last 12 months, technology has featured in our lives...
How 2020 Has Shaped The Way We Live Our Lives
How 2020 Has Shaped The Way We Live Our Lives I’ve had such a busy morning! I’ve hunted down my...
Hot Security Market Needs Smart Engagements
Industry analysts vary on their opinions on the growth and health of the technology market. Depending on which report you...
Honoring Our Brave Military Veterans from the McAfee Community
Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
Honey, We’re Home! Securing Your Devices and Your Family Bond
More and more parents and their kids are experiencing what it’s like to work and learn together from home these...
Homes, Not Just Devices: The New Consumer Cybersecurity
Over the last year, our relationship with digital technology has changed completely, and probably irrevocably. The pandemic has been bruising...
Holiday Travelers! Steer Clear of 3 Common Cyberthreats
The holidays are arguably the most magical time of year. From the twinkle lights and festive cookies, to cozy sweaters...
Holiday Stress Can Make You More Careless Online
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only...
Holiday Rush: How to Check Yourself Before Your Wreck Yourself When Shopping Online
It was the last item on my list and Christmas was less than a week away. I was on the...
Holiday Challenge: How Serious Are You About Curbing Your Screentime?
I tinkered with the idea of signing off Facebook for the holidays. I even wrote the popular “I’m unplugging for...