Featured Blogs
8 Ways to Secure Your Family’s Online Holiday Shopping
It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance...
80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals
With the explosion of growth in technology and its influence on our lives, we have become increasingly dependent on it. The medical field is no exception: Medical professionals trust technology to provide them with accurate information and base life-changing decisions on this data.
80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety
Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you using this strange...
80% of IoT Apps Not Tested for Security Vulnerabilities, Study Says
We use mobile applications every day, and typically, multiple times throughout the day. They’ve become part of the way we...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
9 Tips to Help Kids Avoid Popular App Scams
There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number...
A ‘Second Economy’ Prognosis for Health Care Cybersecurity
McAfee CTO Steve Grobman has pointed out that gaining the upper hand in cybersecurity requires that we extend our thinking...
A Billion Users Affected by Latest Yahoo Breach
Yahoo Inc. just revealed its second major breach in a year. Its first disclosure, taking place in September, claimed that...
A Case of Mistaken Identity? The Role of BlackEnergy in Ukrainian Power Grid Disruption
Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used...
A Connected Nation: IoT in America in 2025
If there’s one thing that remains consistent about technology, it is that it’s always in flux. From tablets to phablets,...
A Cybersecurity Carol: Key Takeaways From This Year’s Most Hackable Holiday Gifts
Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let’s take a look at what we can learn from McAfee’s Most ...
A Cybersecurity Horror Story: Stay Secure From October’s Creepiest Threats
Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month...
A Detailed Guide on Cyberbullying
Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. Therefore, it's crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.
A Dummies Guide to ‘Insider Trading’ via Botnet
This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook. Want to spread...
A Dummies Guide to ‘Insider Trading’ via Botnet, Part 2
This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook. In our first post,...
A Family Technology Contract? Should You or Shouldn’t You?
I would never consider myself to be an A+ parent. Maybe a solid B. Perhaps I can blame the large...
A Field Trip to McAfee’s World of Cyber
By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always...
A Finance Journalist Fell Victim to a $50K Vishing Scam – Are You Also at Risk?
In a world where digital communication dominates, the art of scamming has evolved into a sophisticated game of deception. A...
A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress
More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...
A Glance Into the Neutrino Botnet
Lately, we have seen a number of communications through our automated framework from the Neutrino botnet. While analyzing this botnet,...
A Guide for Parents to Help Kids Navigate Social Media Safely
As the back-to-school season approaches, equipping children with the tools and knowledge to navigate social media safely is crucial. In...
A Guide to Finding Out If Your Information Is on the Dark Web
It’s difficult to imagine what life was like before the internet. We log in daily to pay bills, shop, watch...
A Guide to Identity Theft Statistics for 2023
There’s a digital counterpart for nearly everything we do, which means more of our personal information is online. And although...
A Guide to Remove Malware From Your iPhone
Malicious software, or “malware,” refers to any program designed to infect and disrupt computer systems and networks. The risks associated...
A look ahead to Mobile World Congress 2017
This blog post was written by Nick Viney. It’s nearly that time of year again! Next week, Mobile World Congress...
A Look Back at the Equifax Data Breach, One Year Later
WannaCry, Petya, and Equifax first come to mind when you think of the most impactful cyber events in recent years,...
A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took...