Featured Blogs
Fortnite: Why Kids Love It and What Parents Need to Know
Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded...
Forgot Where You Were Yesterday? Google Has You Covered.
Last Tuesday, Google introduced Your Timeline for its Google Map website and Android devices. Your Timeline acts as a documentarian...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
Focus on Real Friends This Friendship Day
I walked into my niece’s room and found her busy making colourful bands. “What are these for?” I asked. “Friendship...
Floki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...
Flashlight App Steals Data, Leaves Users in Dark
Ahh, the good old days—when flashlights were simple, handheld devices, used to help light your way… Not light producing mobile...
Five-Year-Old Boy Hacks His Xbox One
For most five year-olds, rule breaking usually consists of jumping in puddles and staying up past bedtime. Not so, for...
Five Ways the Internet of Things Can Put Your Security at Risk
Sometimes a new technology comes along that’s so promising, so revolutionary, that, over time, future citizens consider the innovation to...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
Five Things I Don’t Like About Cloud Security for Homeowners (and One Thing I Do)…
For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just...
Five Reasons Why True Key Is Our Knight in Shining Armor
Has it ever happened to you that you tried to log into an account only to find that you seem...
First Smartphone: Are You Putting Cyberbullies Under the Tree This Year?
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer that keeps threats...
Finsta: What You Need to Know About Your Teen’s Fake Instagram Account
Creating a Finsta (fake Instagram) account on the popular photo platform, Instagram has become the norm for many teens. After...
Financial Losses from Tax Scams Top $1,000 on Average—and Gen Z is a Growing Target
Tax season is already stressful for many Americans, and to make matters worse, it’s also a golden opportunity for scammers....
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our...
Father’s Day Shout Out to All Dads – Time to Wear Your Cyberdad Cape
Whenever Father’s Day is near, I find myself thinking about the role of a father in the life of his...
Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Fandango and Credit Karma Mobile Apps Put Users At Risk
A night at the movies previously meant compromising between an edge-of-your-seat thriller and that new Nora Ephron romantic comedy, with...
Family-Friendly Online Safety Tips for Summer Vacations
Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the...
Family Tech: How to Save Your Vanishing Attention Span
Researchers have published a handful of studies in the past few years that examine the impact of technology on the...