Featured Blogs
How we’re #InspiringInclusion at McAfee for International Women’s Day 2024
International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...
The What, Why, and How of AI and Threat Detection
There are more online users now than ever before, thanks to the availability of network-capable devices and online services. The internet...
How to Protect Yourself From Identity Theft After a Data Breach
Did you just get word that your personal information may have been caught up in a data breach? If so,...
How to Identify and Protect Yourself From Venmo Scams and Other Cash App Scams
Venmo, quick and convenient. A great way to pay back a friend or split the cost of a meal. Yet...
How to Keep Cybercriminals Out of Your Accounts
Chocolate chip, oatmeal raisin, snickerdoodle: Cybercriminals have a sweet tooth just like you. But their favorite type of cookie is...
How to Protect Yourself Against Tax Scams
Who else loves tax season besides accountants? Scammers. It’s high time of year for online risks here in the U.S....
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent...
Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...
From Military Kid to Product Marketing: My McAfee Journey
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....