Featured Blogs
Back-to-School: Prepping Your Tech for Learning Pods or Micro School
Back-to-School: Prepping Your Tech for Learning Pods or Micro School With a new academic year starting up, the look of...
Back-to-School: Could Your Remote Learner Be Cyber Cheating?
Back-to-School: Could Your Remote Learner Be Cyber Cheating? As families across the country ramp up for the new school year,...
ScamsWeek2020
Here’s How to Be Yourself and NOT let a Scammer Be You! If you hadn’t truly embraced the incredible benefits...
What Security Means to Professionals
What Security Means to Professionals Recently, we conducted a survey of 600 families and professionals in the U.S. to better...
Women in Sales Part 5: The Value of Support Networks and Inspiration
Women at McAfee are making powerful contributions to our sales efforts. Saleswomen from varying backgrounds share their unique perspectives in hopes of encouraging more women...
How to Protect Your Smart Cameras and Wi-Fi Baby Monitors
People who use devices like smart cameras and Wi-Fi-enabled baby monitors should strongly consider taking the following steps to protect...
ST21: DB Cybertech with Tranel Hawkins & Ben Farber
Security Innovation Alliance Explained McAfee’s Senior Manager of Business Development, Tranel Hawkins and DB Cybertech’s Chief Data Scientist & Product...
What is GPS spoofing?
Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point...
Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee...
The First Smartphone for Free-Ranging Kids
The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids....
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
What Makes My Passwords Vulnerable?
Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.
Medical Care From Home: Telemedicine and Seniors
For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve...
How To Secure Your Mobile Devices
As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...
How To Protect Your Privacy During a Medical Data Breach
We put our trust in these healthcare institutions, expecting them to take the necessary steps to store our sensitive data securely. However, with a significant rise in medical data breaches, it has become more important to understand how these breaches occur and how we can protect ourselves.
Together, We Block and Tackle to Give You Peace of Mind
As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots...
How To Clean Your Digital Habits
You’ve been fortunate over the years — no lost phone, no credit card fraud, no computer viruses. Still, deep down, you fear your sloppy digital habits will eventually catch up with you. Here are seven easy ways to tighten up your digital habits.
How Piyush’s remarkable efforts ignited a larger impact of giving back
At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. ...
Help Kids Steer Clear of Cyberbullies During Summer Break
As we all look forward to the sunshine and freedom of summer, it’s important to remember that not all elements...
Handling Social Media Stress for Teens
Our society is undeniably superbly interconnected, and our digital persona is greatly treasured. However, this isn't always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress.
Spyware: A Major Identity Theft Threat
Spyware is a type of malicious software that collects information about users without their knowledge. It can track every action, from keystrokes to browsing habits, thus presenting a grave threat to user privacy and security.
Telehealth, Distance Learning, & Online Banking: Securing Digital Frontiers
2020 has propelled us into a new digital reality – one where we are reliant on technology to help us...
Can You Decode Your Teen’s Texting Language?
It’s hard to believe, right, parents? In just a blink or two, you went from being the teenager dropping cool phrases like...
Evolving Security Products for the new Realities of Living Life From Home
Announcing McAfee’s Enhanced Consumer Security for New Consumer Realities With millions of people continuing to work and study remotely, scammers have...
Staying Safe While Working Remotely
In the shadow of the COVID-19 pandemic, workplaces worldwide have undergone a seismic shift towards remote working. This article aims to provide a comprehensive guide on how you, as an employee, can augment your cybersecurity measures and stay safe when working remotely.
If You Give A Hacker Your Email Address…
Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.
Celebrities Are Lures For Scammers
Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims.