Featured Blogs
Watch Out for These 3 World Cup Scams
What color jersey will you be sporting this November and December? The World Cup is on its way to television...
Privacy, Identity, and Device Protection: Why You Need to Invest in All Three
Protecting your devices with antivirus is a great start, yet it’s only one part of staying safer online. With the...
Why Everyone Needs a VPN
You may hear corporate cybersecurity experts hail the benefits of a VPN, or a virtual private network, to keep company...
What Is Internet Security?
Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Microsoft’s Edge over Popups (and Google Chrome)
Following up on our previous blog, How to Stop the Popups, McAfee Labs saw a sharp decrease in the number...
The Medibank Data Breach – Steps You Can Take to Protect Yourself
Hackers have posted another batch of stolen health records on the dark web—following a breach that could potentially affect nearly...
What Is Bloatware and How Can It Impact Security?
The joy of purchasing a new device is liberating. Now you can work, learn, and play faster — along with...
How to Remove Your Personal Information From the Internet
Scammers and thieves can get a hold of personal information in several ways, such as through phishing attacks that lure you into handing it over, malware that steals it from your devices, by purchasing your information on dark web marketplaces, or as a result of information leaked in data breaches, ...
What Is Smishing and Vishing, and How Do You Protect Yourself?
Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text...