[breadcrumb]
Family Safety

How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family

Like stockbrokers watch the market, cybercriminals keep an eye on the public’s latest obsessions. And, once they spot a trend...

Privacy & Identity Protection

11 Easy Ways to Start Reclaiming Your Family’s Vanishing Privacy

Every day search engines collect our data, companies sell our information, prying algorithms stalk our clicks and our cell phones...

Family Safety

Protect that Rep! Tips to Help Your High Schooler Shine Online

Do you remember being a teenager and your mom threatening to surgically remove the telephone receiver from your face because you’d...

Family Safety

The Dark Web: What Every Parent Should Know

Mention the Dark Web in conversation and groans will inevitably ensue. Most of us realise it is a dangerous part...

Family Safety

Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub

You’re a jerk. You’re a fat pig. You’re disgusting.  It’s hard to imagine seeing these words written about anyone, but...

Family Safety

McAfee Survey: Parental Input on Tech Safety Declines as Kids Get Older

It’s natural for parents to gradually extend a child more freedom and responsibility as that child matures. Finding the magic...

Family Safety

Survey: Kids Using Devices in School for More than Just Learning

August marks the start of a new school year and with that comes new concerns for parents of digital kids....

Mobile Security Family Safety

Have a Tweeting Teen in Your House? Here’s What You Need to Know

Twitter has evolved over the past decade to mean different things to different people. For adults, the platform has morphed...

Internet Security Mobile Security

Cybersecurity 101: Top Takeaways from Our Back to School Study

The end of summer is almost here, which means both parents and their kids are starting to gear up for...

Family Safety

Trouble Enforcing Family Tech Rules? Stay on Track with the 4 Cs

Setting and enforcing rules — especially online safety ones — can feel close to impossible at times. But there are...

Subscribe to McAfee Securing Tomorrow Blogs