Featured Blogs
Apple Users: This macOS Malware Could Be Spying on You
In 2018, Macs accounted for 10% of all active personal computers. Since then, popularity has skyrocketed. In the first quarter of 2021, Macs experienced 115% growth...
What Is a Data Breach and How Do You Avoid It?
A data breach occurs when cybercriminals steal information from an organization’s database without permission from the owner or administrator. Data...
A Safer Internet for You, Your Family, and Others Too
With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important...
Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store....
At Home or On-the-Go: Boost Your Internet Safety this Summer
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
Keep the Change: 3 Tips for Using the Twitter Tip Jar
When we think of tipping, many don’t see it as anything beyond a display of gratitude. However, Twitter’s latest feature is prompting its users to rethink this sentiment. It hasn’t been long since Twitter...
Elevate Your Financial Security: How to Safely Bank Online
Today’s technology allows you to complete various tasks at the touch of a button wherever you go. As a result, you place trust in online services that make...
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...
CRN’s Women of the Channel 2021 Recognizes McAfee Leaders
Every year CRN recognizes the women who are leading the channel and their unique strengths, vision, and achievements. This year, CRN recognized five McAfee...
How to Safely Incorporate IoT Into Your Fitness Routine
Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic,...
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
3 Tips to a Holistic Online Security Approach
Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your...
Major HTTP Vulnerability in Windows Could Lead to Wormable Exploit
Today, Microsoft released a highly critical vulnerability (CVE-2021-31166) in its web server http.sys. This product is a Windows-only HTTP server...
“Fool’s Gold”: Questionable Vaccines, Bogus Results, and Forged Cards
Preface Countries all over the world are racing to achieve so-called herd immunity against COVID-19 by vaccinating their populations. From...
Seeking Reconnection: Internet Usage and the Return to Travel
Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll...
How to Remain Secure While Using Running Apps
When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....
Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
How to Stop the Popups
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...
World Password Day: Make Passwords the Strongest Link in Your Online Security
World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene...
Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...
PC Gamers (and Parents of Gamers) Rejoice!
Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them....
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
What Is Adware? A Definitive Guide
We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...
Beware of BRATA: How to Avoid Android Malware Attack
Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Digital Divorce: Who Gets the Airline Miles and Music Files?
Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor...