[breadcrumb]
Family Safety

Why the New Flinch App is Far From Family Friendly

It’s called Flinch and the idea behind this new app echoes an innocent childhood game: Stare at the other person...

Family Safety

What Leads a Child to Connect with Strangers Online?

At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity thieves found its...

How To Guides and Tutorials Family Safety

How to Remove Unwanted Photos of Your Child Online

There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...

Internet Security Privacy & Identity Protection

How Hackers Use Popular Shows to Infect Your Devices

If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....

Family Safety

McAfee’s New Digital Safety Program at the 2014 CED Fall Policy Conferencece

This week I had the privilege of visiting Washington, D.C., to attend the Committee for Economic Development (CED) Fall Policy...

Internet Security Family Safety Privacy & Identity Protection

What Is a Trojan Horse?

One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...

Internet Security Privacy & Identity Protection

What is Browser Hijacking?

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The...

Mobile Security Family Safety Privacy & Identity Protection

What’s Your Click IQ?

The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...

Family Safety

Have You Had the ‘Dangerous Celebrity’ Talk with Your Kids?

By now hopefully you’ve had several critical conversations with your child about the good, the bad, and the risky of...

McAfee Labs

Top 3 Phishing Attacks Use Similar Tricks

Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...

Subscribe to McAfee Securing Tomorrow Blogs