Featured Blogs
The Smart Home Security Guide
The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...
AI & Your Family: The Wows and Potential Risks
From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday The reality is beginning to hit: The holiday...
McAfee Team Members Share Their Virtual Onboarding Experiences
At McAfee, ensuring our new team members are well prepared and supported for their roles is a top priority. From...
What is Social Engineering?
In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...
Keeping Kids Safe from Online Threats
The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.
How Cybercriminals Are Shopping for Personal Data This Black Friday
While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...
How To Protect Yourself from SMiShing Attacks
SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...
How to Fight Back Against Vishing and Smishing Attacks
With the advent of technology and the widespread use of mobile phones, scam calls and texts have become increasingly common. These annoying and invasive attempts to trick you out of your personal information can be frightening and frustrating. They often come in the form of ‘vishing‘ and ‘smishing‘ attacks. But ...
Zooming with the Grandkids: Five Easy Video Chat Apps for the Holidays
Zooming with the Grandkids, Nieces, and Nephews: Five Free and Easy Video Chat Apps for the Holidays All the kids...
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected You wake up, log in to your Outlook, and...
Online Shopping: The Dos and Don’ts
Internet shopping has become an integral part of our daily lives, providing convenience, variety, and easy price comparisons. However, with this convenience comes potential risks. This article explores the dos and don’ts of online shopping to help you navigate this virtual marketplace safely and effectively.
Putting Protection to The Test
Putting Protection to The Test This year has thrown a lot of challenges at us, and our digital lives were...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...
Additional Analysis into the SUNBURST Backdoor
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the...
Best Smart Home Devices for a Connected New Year
Like many of you, I spent a lot of time at home this year, but it came with an unexpected...
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...
2020 In Review: The Top 10 Most Popular Life at McAfee Blogs
2020 has been quite the year for many, and through it all, we’re reflecting on everything we are thankful for. This includes the incredible stories and invaluable perspectives that...
McAfee Security Innovation Alliance 2020 MPOWER Awards
McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The 2020 awards recognize partners who...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....
4 Ways to Help Your Family Combat Cyber Threats in the New Year
No doubt, we have a lot to be hopeful for as we step into the New Year. We’ve adapted, survived,...
2021 Threat Predictions Report
The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector –...
Top Security Threats to Look Out for in 2021
Top Cyber Security Threats to Look Out for in 2021 2020 was unexpectedly defined by a global pandemic. Throughout the...
A Year in Review: Threat Landscape for 2020
As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the...
CES 2021: Highlights From the “Cleanest” Show Yet!
Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However,...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...