Featured Blogs
3 Reasons to Think Twice About Enabling Location Sharing
Do you remember the days of printing out directions from your desktop? Or the times when passengers were navigation co-pilots...
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
Parent’s Guide: 8 Ways to Help Your Teen Combat Distracted Driving
Read this statement, then read it again: Just five distracted seconds at 55 mph is equivalent to driving the length...
The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks
Cybercrime has a price. One that more and more business owners find themselves paying. The costs push well into the...
Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?
What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves. Understanding...
How To Protect Your Digital Estate
While we’re enjoying all the good things in our digital lives—our eBooks, movies, email accounts, social media profiles, eBay stores,...
What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe
Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping...
How to Protect Your Family From AI Scams
AI scams are becoming increasingly common. With the rise of artificial intelligence and technology, fraudulent activity is becoming more sophisticated...
How to Protect Your Privacy From Generative AI
With the rise of artificial intelligence (AI) and machine learning, concerns about the privacy of personal data have reached an...
How to Protect School Children From Deep Fakes
Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children....
Be Mindful of These 3 AI Tricks on World Social Media Day
Happy World Social Media Day! Today’s a day about celebrating the life-long friendships you’ve made thanks to social media. Social...
iPhone Update — Apply It Now If You Haven’t Already
Apple recently issued an urgent iPhone update, iOS version 16.5.1. If you haven’t updated yet, you should. Owners of iPads...
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you...
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in a secure building...
Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info
Turns out, scammers really love Barbie. As Barbie makes her debut on the big screen, scammers are aiming to cash...
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as a power and...
Four Ways To Use AI Responsibly
Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...
Scammers Follow the Rebranding of Twitter to X, to Distribute Malware
Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social networking site, Twitter...
What is Spyware?
Spyware. If the name sounds creepy and invasive, that’s because it is. The thought of someone virtually looking over your...
AI in the Wild: Malicious Applications of Mainstream AI Tools
It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...
World Wide Web Day: How to Protect Your Family Online
The first of August marks the celebration of World Wide Web Day – a day dedicated to the global network...
The Wild West of AI: Do Any AI Laws Exist?
Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all the mentions of...
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
How to Protect Your Social Media Passwords from Hacks and Attacks
What does a hacker want with your social media account? Plenty. Hackers hijack social media accounts for several reasons. They’ll...
Invisible Adware: Unveiling Ad Fraud Targeting Android Users
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
5 Online Gaming Tips to Stay Safe From Cybercriminals
Vanquishing aliens, building virtual amusement parks, mashing buttons in online battles royale. For some, playing video games is a way...
Be on the Lookout for Scam Tech Support Calls
Instead of getting you out of a jam, tech support scams get you into one. And they can get costly....