Featured Blogs
Wedding Planning App Users Hacked Before the Big Day
Say you’re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to...
Welcome McAfee Forward—the Future of Online Protection Today
With digital life-changing so rapidly, it’s time for a new way to protect it. Welcome to McAfee Forward—the future of...
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
What About a Heart-To-Heart Talk with Your Loved Ones This Valentine’s Day?
I was listening to the Valentine’s Day playlist of my friend when suddenly espied one of my favorites- Ain’t No...
What are Pig Butchering Scams and How Do They Work?
“Jessica” cost him one million dollars. In an account to Forbes, one man described how he met “Jessica” online.i Readily,...
What Are Ransomware Attacks? An In-Depth Guide
Ransomware is a malicious type of malware that cybercriminals use to encrypt the target’s files or lock their computer systems,...
What Are Serverless Apps?
The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...
What Are Tailgating Attacks and How to Protect Yourself From Them
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...
What Are the 6 Types of Identity Theft
You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...
What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five...
What Are the Risks of Clicking on Malicious Links?
A simple click of a link can’t cause any trouble, right? Wrong. It doesn’t matter if you quickly close out...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...
What Could (Pokémon) Go Wrong?
This blog was written by Bruce Snell. If you’re like me, your Facebook feed (and Twitter, Instagram, Vine, etc) has...
What CVE-2020-0601 Teaches Us About Microsoft’s TLS Certificate Verification Process
By: Jan Schnellbächer and Martin Stecher, McAfee Germany GmbH This week security researches around the world were very busy working...
What Do Social Media Companies Know About You?
What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...
What Do Your Kids Want To Be When They Grow Up?
When I was 8, I was completely obsessed with being an air hostess ‘when I grew up.’ The thought of travelling the...
What Does It Take To Be Digitally Secure?
Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your...
What Does Your Password Say About Your Preferences?
Passwords say a lot about us. They speak to what we prioritize, what we hold dear. So when I recently saw my wife’s password included...
What Does “Connection is Not Private” Mean?
Have you ever visited a site that triggers a “your connection is not private” or “your connection is not secure”...
What Drives a Ransomware Criminal? CoinVault Developers Convicted
How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of...
What Else Kids Give Away When They Share Their Personal Passwords
Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t...
What Everyone Can Learn from The Mark Zuckerberg Hack
When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...
What Families Can Learn from the #HisNameIsCayden Hashtag
A recent Facebook post that went viral cost an Atlanta man his job and opened an important conversation for families around...
What is a Backdoor Threat?
Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back...
What is a Botnet?
The word botnet or bot is short for robot network. A botnet is a group of Internet-connected personal computers that...
What Is a Botnet?
What is a botnet? And what does it have to do with a toaster? We’ll get to that. First, a...