Featured Blogs
The Hacker’s New Best Friend Could be Your USB Port
It’s tiny and portable, yet perfect for storing large items. I’m talking about the good ol’ Universal Serial Bus (a.k.a...
The Hidden Costs of Cyber Attacks
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...
The Holiday Season is Here, Spreading Hackable Gifts Wide and Near
It’s the most wonderful time of the year, but I’m feeling anxious — security anxious, that is. Every year, we...
The Hollywood Sign is Not on Fire: Deepfakes Spread During L.A. Wildfires
Amid the devastation of the Los Angeles County wildfires – scorching an area twice the size of Manhattan – McAfee...
The importance of cyber self-defense education
This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear; there is still...
The Importance of Security Awareness in Our Connected Lifestyle
Not very long ago, people could be seen walking around waving their mobile phones in the air, looking for a...
The increasing threat of hackers at major sporting events
This blog post was written by Nick Viney. Every year, sporting events around the world become a desirable target for...
The Internet is for Everyone to Enjoy—We’re Helping See to It
The internet is meant for all to enjoy. And that’s who we’re looking out for—you and everyone who wants to enjoy life online. We believe it’s important that...
The Internet of Things Needs a Standard. There’s a Consortium for That
Let’s talk about networks. A network can imply a number of things: it can imply a group of friends, coworkers...
The iOS Twitter Bug: 3 Tips to Protect Your Location Data
Many of us use social media to keep our family and friends up-to-date on our everyday lives. We don’t typically...
The iPhone’s Biggest Weakness May Be Your Computer
Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately,...
The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you...
The Kaspersky Software Ban—What You Need to Know to Stay Safe Online
Citing national security concerns, the U.S. Department of Commerce has issued a ban on the sale of all Kaspersky online...
The Kids are in Charge
By Ribu, Communications Manager Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children...
The Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology....
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
The Latest Pawn in the Warranty Fraud Game? Fitbit Users
With great technology comes great responsibility. This is particularly true when it comes to protecting technology. And with more and...
The Legacy Continues – What Black History Month Means to Us
By Karla, Digital Media Specialist At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the...
The McAfee Adventures of a Middle School Teacher
By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. –...
The McAfee Americas Channel Promise
In my 26th year at McAfee, my fourth leading the Americas Channel Organization, I wanted to take a step back...
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
The Mobile Web vs. Native Apps
The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
The Most Hackable Christmas Gifts of 2016 – Are You Prepared?
I’ve decided that 2016 will be a calm and collected Christmas in our house. I’m saying NO to last minute...
The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that...
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
The Mute Button: How to Use Your Most Underrated Social Superpower
For a Monday, the school day was turning out to be surprisingly awesome. Mackenzie sat with friends at lunch, chatted with...