The Wearable Future Is Hackable. Here’s What You Need To Know
Quick mental math challenge: How many Apple Watches can you buy with $118 billion dollars? If you guessed around 296...
What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes
What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes Imagine you’re driving down a highway...
New Insights From McAfee’s Survey Around Remote Work
The last few months have brought about a lot of change for all of us. Due to social distancing, companies...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
Research Reveals Americans’ Perceptions of Device Security Amidst CES 2020
From the Lifx Switch smart switch to the Charmin RollBot to Kohler Setra Alexa-connected faucets, CES 2020 has introduced new...
What You Need to Know About the Latest IoT Device Flaws
The McAfee Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and...
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...
McAfee Receives the 2019 Security Excellence Award From IoT Evolution
If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
How to Build Your 5G Preparedness Toolkit
5G has been nearly a decade in the making but has really dominated the mobile conversation in the last year...