McAfee

Blog Archives

LinkedIN Twitter
We're here to make life online safe and enjoyable for everyone.

Articles by Author

Internet Security
‘Sleigh’ Holiday Shopping by Protecting Your Online Security
The onset of the global health emergency caused users everywhere to live, work, play, and buy through their devices. However,...
Privacy & Identity Protection
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your...
How To Guides and Tutorials
How to Prevent Keyboard Snooping Attacks on Video Calls
Video calling has rapidly become the mainstream method for remote communication, allowing users to stay connected. But very few may...
Internet Security
Thankful for broadband internet, and hopeful for much more  
We’ve shopped, worked, studied and taught, job hunted, and cared for each other online this year in ways we haven’t before. So much that it’s difficult to imagine...
Family Safety
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new...
Family Safety
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person goes online each day with the sole mission to trigger confrontation...
Family Safety
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques...
Family Safety
Are You Forwarding Jokes Or Spam?
With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent...
Family Safety
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you...
Privacy & Identity Protection
How To Tell If Your Smart TV Spying on You
In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or...
How To Guides and Tutorials
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance...
Privacy & Identity Protection
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious...
289 - 300 of 1418

Stay Updated

Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats.

FacebookTwitterInstagramLinkedINYouTubeRSS
Back to top