Key Lessons From Verizon’s ‘2016 Data Breach Investigations Report’
The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices. The good folks...
How To Protect Yourself From The Malware That’s Costing Consumers Millions
This blog post was written by Nick Viney. You may have heard about the hack of a Presbyterian Medical Center...
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
5G Networks Pose Cyber Risks, Opportunities
Fifth-generation networking (5G) holds the potential for a massive immersion of technology into the lives of people and businesses. It...
Data Privacy Day: Respecting Privacy, Safeguarding Data and Enabling Trust
This blog post was written by Bruce Snell. At McAfee, we are happy to be part of Data Privacy Day....
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets,...
The Dangers of Walking and Talking
As safe drivers and responsible community members, I know we are all aware that you just can’t use your mobile...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following...
What is the Cloud?
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe...
Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared?
When social media really took off about 10 years ago, I think many of us assumed that it might just...