Featured Blogs
2014: Security Year in Review
From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats—2014 did not leave us wanting...
2014 Threats Predictions: Software Defined Networking And More
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Network and Host Attacks Will Again Target Apps, Java
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Cybercrime and Hacktivism Will Continue to Grow
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions....
2014 Threats Predictions: Cloud Attacks Could Lead to Data Loss
This post is one in a series of articles that expand on the recently released McAfee Labs 2014 Threats Predictions. In...
2012 Online Safety Survey – Majority Of Americans Do Not Feel Completely Safe Online
From tweens and teens to silver surfers, more people are jumping onto multiple Internet connected devices every day. It’s very...
2.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay Secure
The digitalization of data allows it to move effortlessly and be accessed from devices and places around the world within...
16Shop Now Targets Amazon
Since early November 2018 McAfee Labs have observed a phishing kit, dubbed 16Shop, being used by malicious actors to target...
15,000+ Roku Accounts Compromised — Take These Steps to Protect Yourself
Hackers used one of the oldest tricks in the book to turn a buck. All at the expense of several...
15+ Boredom-Busting Apps to Boost Your Family’s Summer Fun
Vacation. Check. Pool Day. Check. Fourth of July. Check. It’s about that time. Summer is half over, and back-to-school sales...
15 Tips To Better Password Security
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...
15 Social Media Security Tips
1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear...
15 Easy, Effective Ways to Start Winning Back Your Online Privacy
Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a...
14 Million Customers Affected By Hostinger Breach: How to Secure Your Data
Whether you’re a small business owner or a blogger, having an accessible website is a must. That’s why many users...
123456 Is Not an Acceptable Password
A common misconception is that a password only needs to be memorable. Whilst this is a helpful trait, it does a disservice to the importance of having a secure series of characters. This guide will walk you through why "123456" is not an acceptable password.
12 Days of Hack-mas
2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered...
11 Easy Ways to Start Reclaiming Your Family’s Vanishing Privacy
Every day search engines collect our data, companies sell our information, prying algorithms stalk our clicks and our cell phones...
10 Ways to Protect Your Identity
We’re online more than ever, in large part because it allows us to take advantage of online conveniences like bill...