Featured Blogs
How Cybercriminals Are Shopping for Personal Data This Black Friday
While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group...
Keeping Kids Safe from Online Threats
The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.
What is Social Engineering?
In the realm of cybersecurity, there is one vulnerability that is often overlooked – the human element. While firewalls, encryption,...
McAfee Team Members Share Their Virtual Onboarding Experiences
At McAfee, ensuring our new team members are well prepared and supported for their roles is a top priority. From...
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday
5 Fun Ways to Keep Family Connections Strong (and Secure) This Holiday The reality is beginning to hit: The holiday...
AI & Your Family: The Wows and Potential Risks
From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...
The Smart Home Security Guide
The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...
Spot Those Black Friday and Cyber Monday Shopping Scams
We’re not the only ones looking forward to the big holiday sales like Black Friday and Cyber Monday. Hackers are too. As people flock to retailers big and small in search of the best deals online, hackers have their shopping scams ready.
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
‘Sleigh’ Holiday Shopping by Protecting Your Online Security
‘Sleigh’ Holiday Shopping by Protecting Your Online Security And just like that, the holiday shopping season is among us! Like...
How To Keep Your Data Private Online
Whether data gets collected for advertising purposes, or to generate profit by selling data to others, your privacy has a price tag on it. Yet you have some say in all this. You can take several steps that can minimize the data trail that you create by going online. Put ...
How to Prevent Keyboard Snooping Attacks on Video Calls
Video conferencing has really taken off this year. With more people working and learning from home than ever before, video...
Thankful for broadband internet, and hopeful for much more
Thankful for broadband internet, and hopeful for much more Where would we be without our internet this year? We’ve shopped, worked, studied and taught, job hunted, and cared...
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person who goes online each day with the sole mission of triggering confrontation, provoking conflict,...
CVE-2020-17051: Remote kernel heap overflow in NFSv3 Windows Server
CVSS Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Overview Microsoft released a patch today for a critical vulnerability (CVE-2020-17051) in the Windows NFSv3 (Network File System) server. NFS is typically...
Honoring Our Brave Military Veterans from the McAfee Community
Paying Tribute November 11 marks Veterans Day and Remembrance Day. It is a time for us to come together and...
What You Need to Know About Among Us
Among Us – one of the Most Popular Online Game of 2020 If you have teens and you haven’t yet...
Pickpocketing – Digital Style
Gone are the days when thieves would physically steal your wallet. Instead, they are using sophisticated techniques to steal your personal information and drain your bank accounts without you even realizing it. This article aims to shed light on digital pickpocketing, its impacts on your digital assets, and measures to ...
Are You Forwarding Jokes Or Spam?
With the advent of messaging and social media applications, sharing jokes or memes has become increasingly frequent and convenient. While we often perceive this as harmless fun, it’s essential to address a question that we don’t ask ourselves often enough: Are we forwarding jokes or inadvertently distributing spam?
5 Ways to Safeguard Your Child’s Instagram Bio
Keeping your child safe online is a growing concern for many parents. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider.
How To Tell If Your Smart TV Spying on You
In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case,...
Helping Your Family Combat Digital Misinformation
Helping Your Family Combat Digital Misinformation If 2020 has taught us anything, it’s that our ability to think critically about...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
Beware of Malicious Mobile Apps
With the surge in the usage of mobile phones, there has been a concurrent increase in malicious activities targeting these devices. One common technique used by hackers is to corrupt legitimate applications. Android devices, in particular, see increases in malware targeting mobile phones year by year.
One Team Member Selflessly Provides Relief to COVID-19’s Front Line
By: Heiko, Senior Security Engineer, Germany I never could have imagined that what started as a national duty to volunteer...
Operation North Star: Behind The Scenes
Executive Summary It is rare to be provided an inside view on how major cyber espionage campaigns are conducted within...