Featured Blogs
The Busy Parents’ Guide to Keeping Your Kids Safe Online
As a busy mum of 4, I often feel that my brain is in overload. Too much information – not...
The Case for Your Security at CES 2023
As technology weaves itself into our lives in new and unexpected ways, some of it will get quite personal and...
The Cerberus Banking Trojan: 3 Tips to Secure Your Financial Data
A new banking trojan has emerged and is going after users’ Android devices. Dubbed Cerberus, this remote access trojan allows...
The Channel Transformation to Ascend
This blog was written by Richard Steranka. In our continued quest to become our customers’ #1 security vendor and our...
The Cloning of The Ring – Who Can Unlock Your Door?
Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...
The Collection #1 Data Breach: Insights and Tips on This Cyberthreat
As the cybersecurity landscape evolves to match new trends in technology, it’s important for consumers to prioritize the protection of...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1
The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with...
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
The Dangers of Artificial Intelligence
Over the decades, Hollywood has depicted artificial intelligence (AI) in multiple unsettling ways. In their futuristic settings, the AI begins...
The Dangers of Linking Your Apple ID to Financial Accounts
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
The Dangers of Walking and Talking
As safe drivers and responsible community members, I know we are all aware that you just can’t use your mobile...
The Dark Side of Clickbait: How Fake Video Links Deliver Malware
Authored By Sakshi Jaiswal McAfee Labs recently observed a surge in phishing campaigns that use fake viral video links to trick users...
The Dark Side of Gen AI
There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...
The Dark Web: A Definitive Guide
The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay...
The Dark Web: What Every Parent Should Know
Mention the Dark Web in conversation and groans will inevitably ensue. Most of us realise it is a dangerous part...
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
The Dilemma of Anonymity and Dangers of Ask.fm
Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users...
The Do You Knows of DDoS Attacks
“Where’s my phone?” In a blink of an eye, my home is suddenly flipped upside down—couch cushions overturned, drawers –...
The Drone that can Fly and Spy on Your Smartphone
For many, the notion of a flying drone conjures an image of an unmanned airborne military surveillance machine, or a...
The Economic Growth, Regulatory Relief & Consumer Protection Act: What Parents Should Know
When we think about credit cards, we usually think of our own – what we use them for, how our...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Facebook Cull and Why You Should Embrace It!
So, how many friends do you have on Facebook? Do you really know them or were they just a passing...
The Facebook Hack That Lets Strangers Spy on Your Sleep Patterns
Many of us check Facebook first thing in the morning. We’ve all been guilty of browsing away in bed before...