Featured Blogs
New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report
New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report 2020 was a year unlike any other. We transitioned from...
New Year, New Digital You: Canadian Survey Findings from McAfee
New Year, New Digital You: Canadian Survey Findings from McAfee McAfee is headquartered in the U.S. and with our impressive...
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet...
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two
The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with...
The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1
The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their...
Two Pink Lines
Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
CES 2021: Highlights From the “Cleanest” Show Yet!
Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However,...
A Year in Review: Threat Landscape for 2020
As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the...
Top Security Threats to Look Out for in 2021
Top Cyber Security Threats to Look Out for in 2021 2020 was unexpectedly defined by a global pandemic. Throughout the...
2021 Threat Predictions Report
The December 2020 revelations around the SUNBURST campaigns exploiting the SolarWinds Orion platform have revealed a new attack vector –...
4 Ways to Help Your Family Combat Cyber Threats in the New Year
No doubt, we have a lot to be hopeful for as we step into the New Year. We’ve adapted, survived,...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....
McAfee Security Innovation Alliance 2020 MPOWER Awards
McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The 2020 awards recognize partners who...
2020 In Review: The Top 10 Most Popular Life at McAfee Blogs
2020 has been quite the year for many, and through it all, we’re reflecting on everything we are thankful for. This includes the incredible stories and invaluable perspectives that...
How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise
In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management...
Best Smart Home Devices for a Connected New Year
Like many of you, I spent a lot of time at home this year, but it came with an unexpected...
Additional Analysis into the SUNBURST Backdoor
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the...
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Putting Protection to The Test
Putting Protection to The Test This year has thrown a lot of challenges at us, and our digital lives were...
Online Shopping: The Dos and Don’ts
Internet shopping has become an integral part of our daily lives, providing convenience, variety, and easy price comparisons. However, with this convenience comes potential risks. This article explores the dos and don’ts of online shopping to help you navigate this virtual marketplace safely and effectively.
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected You wake up, log in to your Outlook, and...
Zooming with the Grandkids: Five Easy Video Chat Apps for the Holidays
Zooming with the Grandkids, Nieces, and Nephews: Five Free and Easy Video Chat Apps for the Holidays All the kids...
How to Fight Back Against Vishing and Smishing Attacks
With the advent of technology and the widespread use of mobile phones, scam calls and texts have become increasingly common. These annoying and invasive attempts to trick you out of your personal information can be frightening and frustrating. They often come in the form of ‘vishing‘ and ‘smishing‘ attacks. But ...
How To Protect Yourself from SMiShing Attacks
SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, ...