2880 matching results for "screen time"

FILTER BY:
SORT BY:
Privacy & Identity Protection
How to Protect Your Social Media Passwords from Hacks and Attacks
What does a hacker want with your social media account? Plenty.  Hackers hijack social media accounts for...
McAfee Labs
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah  As the Back-to-School season approaches, scammers are taking advantage of...
Internet Security
The Wild West of AI: Do Any AI Laws Exist?
Are we in the Wild West? Scrolling through your social media feed and breaking news sites, all...
Internet Security
World Wide Web Day: How to Protect Your Family Online
The first of August marks the celebration of World Wide Web Day – a day dedicated to...
Internet Security
AI in the Wild: Malicious Applications of Mainstream AI Tools
It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and...
Privacy & Identity Protection
What is Spyware?
Spyware. If the name sounds creepy and invasive, that’s because it is.  The thought of someone virtually...
McAfee Labs
Scammers Follow the Rebranding of Twitter to X, to Distribute Malware
Authored by: Vallabh Chole and Yerko Grbic On July 23rd, 2023, Elon Musk announced that the social...
Privacy & Identity Protection
Four Ways To Use AI Responsibly
Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it...
McAfee Labs
Android SpyNote attacks electric and water public utility users in Japan
Authored by Yukihiro Okutomi  McAfee’s Mobile team observed a smishing campaign against Japanese Android users posing as...
Internet Security
Scammers Love Barbie: Fake Videos Promote Bogus Ticket Offers That Steal Personal Info
Turns out, scammers really love Barbie.  As Barbie makes her debut on the big screen, scammers are...
Internet Security
How to Protect Yourself From Tailgating Attacks
Holding the door for someone might open the way to a cyberattack. For anyone who works in...
Internet Security
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through...
373 - 384 of 2880

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top