Featured Blogs
Technical Support Scams – What to look out for
Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make...
Celebrate World Wide Web Day: The Evolution of Web Safety
The World Wide Web, invented in 1989 by Tim Berners-Lee, has undoubtedly made our lives more convenient in so many...
New HiddenAds malware affects 1M+ users and hides on the Google Play Store
Authored by Dexter Shin McAfee’s Mobile Research Team has identified new malware on the Google Play Store. Most of them...
What Are Ransomware Attacks? An In-Depth Guide
Ransomware is a malicious type of malware that cybercriminals use to encrypt the target’s files or lock their computer systems,...
What Is Malvertising and How Do You Avoid It?
Smartphones and personal computers have enhanced our lives in so many ways that it can be hard to even imagine...
How to tell If Your Identity Has Been Stolen
Most of us use the internet every day, so we’re comfortable sharing a lot of information online. However, cybercriminals want...
Can My Phone Be Tracked If Location Services Are Off?
Your smartphone comes with built-in location services, which are useful if you lose it or if you use an app...
How to Set Up a VPN on an Android
There’s no denying that the internet fills a big part of our days. Whether playing, working, or studying, we rely...
Don’t Stop Learning! Jeremy’s McAfee Journey
Our How I Got Here series spotlights the stories of team members who have successfully grown their careers here at McAfee. This...
