Featured Blogs
How Piyush’s remarkable efforts ignited a larger impact of giving back
At McAfee, we support team members who are passionate about giving back. You are encouraged and empowered to make a substantial impact in improving our community and volunteering to help others. ...
How To Clean Your Digital Habits
You’ve been fortunate over the years — no lost phone, no credit card fraud, no computer viruses. Still, deep down, you fear your sloppy digital habits will eventually catch up with you. Here are seven easy ways to tighten up your digital habits.
Together, We Block and Tackle to Give You Peace of Mind
As a leader in cybersecurity, we at McAfee understand that every aspect of your digital life has potential weak spots...
How To Protect Your Privacy During a Medical Data Breach
We put our trust in these healthcare institutions, expecting them to take the necessary steps to store our sensitive data securely. However, with a significant rise in medical data breaches, it has become more important to understand how these breaches occur and how we can protect ourselves.
How To Secure Your Mobile Devices
As we increasingly depend on our digital devices to store and transfer personal data and use the internet for transactions, we are also becoming increasingly vulnerable to digital attacks on our privacy. Having a PIN on your devices is a simple but effective way to add an extra layer of ...
Medical Care From Home: Telemedicine and Seniors
For weeks and even months now, millions of us have relied on the internet in ways we haven’t before. We’ve...
What Makes My Passwords Vulnerable?
Passwords serve as the first line of defense against unauthorized access to our online accounts, be it email, social media, banking, or other sensitive platforms. Let's explore the common techniques for cracking passwords, and learn how to stay one step ahead in the ongoing battle for online security.
Vulnerability Discovery in Open Source Libraries: Analyzing CVE-2020-11863
Open Source projects are the building blocks of any software development process. As we indicated in our previous blog, as...
The First Smartphone for Free-Ranging Kids
The First Smartphone for Free-Ranging Kids In an earlier article, we took a look at smartphone alternatives for free-ranging kids....
Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee...