Why the New Flinch App is Far From Family Friendly
It’s called Flinch and the idea behind this new app echoes an innocent childhood game: Stare at the other person...
What Leads a Child to Connect with Strangers Online?
At a recent ladies’ get-together, discussion about the murky world of online grooming, cyber stalking, and identity thieves found its...
How to Remove Unwanted Photos of Your Child Online
There’s a chance you may skip this blog post thinking to yourself: This will never happen to my child. I have a...
How Hackers Use Popular Shows to Infect Your Devices
If there’s one reasonable measurement of how popular a television series has become, it’s how often it’s illegally downloaded online....
McAfee’s New Digital Safety Program at the 2014 CED Fall Policy Conferencece
This week I had the privilege of visiting Washington, D.C., to attend the Committee for Economic Development (CED) Fall Policy...
What Is a Trojan Horse?
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that...
What is Browser Hijacking?
Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed or check out The...
What’s Your Click IQ?
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your...
Have You Had the ‘Dangerous Celebrity’ Talk with Your Kids?
By now hopefully you’ve had several critical conversations with your child about the good, the bad, and the risky of...
Top 3 Phishing Attacks Use Similar Tricks
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...