Featured Blogs
Operation North Star: Summary Of Our Latest Analysis
McAfee’s Advanced Threat Research (ATR) today released research that uncovers previously undiscovered information on how Operation North Star evaluated its...
Why Does My Phone Get Hot?
Overheating is a common issue in mobile devices, but it often raises alarms among users. This concern is usually unnecessary, as there are several common and easily resolvable reasons why phones get hot. However, it is essential to cool down an excessively hot device promptly to prevent it from overheating ...
How Extremist Groups Target Teens Online
With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online.
Top 5 Most Dangerous Email Subject Lines
In this article, we delve deeper into the tactic that is a favorite among cybercriminals – ‘phishing‘ via emails. We focus on the trickiest and most dangerous email subject lines that have been commonly used in worldwide phishing emails. Recognizing these ‘ baits’ can be your first step towards safeguarding ...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.
Parents: Are Your Kids Ignoring the Danger of Dating Apps?
As a parent, you might feel caught in a dilemma. On one hand, you want to respect your teen’s privacy and independence. On the other, you worry about the potential dangers lurking behind these digital platforms. This article aims to shed light on the risks associated with teenage use of ...
Weak Passwords Can Cost You Everything
The importance of having strong, unique passwords cannot be overstated. However, most individuals tend to use weak passwords or reuse the same password over and over, exposing their digital assets to potential hackers.
The Mobile Web vs. Native Apps
The debate between the mobile web and native apps has become increasingly relevant, with each approach offering unique advantages and disadvantages. This article aims to provide a comprehensive comparison between mobile web and native apps, with a particular emphasis on how each can impact your online safety.
My Child Wants a Phone. Should I Say ‘Yes’?
There are several factors to consider before taking this significant decision. Apart from their age, their maturity level, technology habits, and your gut instinct should be the primary considerations.
Election 2020: Lookout for Fake News Before and After the Election
Election 2020: Keep on the Lookout for Fake News Before and After the Election As the news and conversations leading...
US-B Careful: Public iPhone Chargers Lie in Wait
It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers?
Cyber Monday: Protect Yourself and Your Family from Online Shopping Scams
The eagerly awaited holiday sales such as Black Friday and Cyber Monday are just around the corner. These tips will help you avoid falling prey to online scams, thereby ensuring that you keep your finances safe during this shopping season.
Black Friday and Cyber Monday Scams: Beware of the Pitfalls
With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.
Spotlighting McAfee’s Women in Technology Scholarship Recipients
Working at McAfee is so much more than fighting off cyber-attacks; it’s also about learning valuable life lessons and fostering...
Cruel Ghouls: New Digital Scams Target Every Age Group
Cruel Ghouls: New Digital Scams Target Every Age Group There are few situations more personal than a distressed family member...
Secure Your Black Friday & Cyber Monday Purchases
Black Friday and Cyber Monday have practically become holidays themselves, as each year, they immediately shift our attention from turkey and pumpkin pie to holiday shopping. Let’s look at these two holidays and how their popularity can impact users’ online security.
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
What is Roblox and is It Safe for Kids?
If you have a tween or teen, you’ve likely heard a lot of excited chatter about Roblox. With a reported 150 million users, there’s a good chance your child has the Roblox site on their phone, tablet, PC, or Xbox. However, as with all digital destinations, the fun of Roblox ...
Why Taking Your Teen’s Phone Away Doesn’t Work Anymore
If you are the parent of a tween or teen, you know the challenge of setting and following through with consequences. If you are like many parents, your first instinct is to restrict the thing they love the most, which is communication with their peers and the dependence they have ...
Trick or Treat: Avoid These Spooky Threats This Halloween
Trick or Treat: Avoid These Spooky Threats This Halloween Spooky season is among us, and ghosts and goblins aren’t the only...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Online Safety for Seniors
Just like how we guide our children to understand and safely navigate the Internet, it is equally important to educate our elderly loved ones about the risks and best practices for using the Internet. By being proactive and involving them in our digital lives, we can help to ensure their ...
Election 2020: Make Sure Your Voice is Heard with These Tips
Election 2020: Make Sure Your Voice is Heard with These Tips & Best Practices Last year, India exercised one of...
5G and the IoT: A Look Ahead at What’s Next for Your Home and Community
5G and the IoT: A Look Ahead at What’s Next for Your Home and Community October is Cybersecurity Awareness Month,...
Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone
While virtual playdates, hangouts, and video chats provides an excellent solution for children to interact with their peers, it has also opened up a new avenue for potential risks and dangers. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for ...
Election 2020 – How to Spot Phony Deepfake Videos this Election
Election 2020 – How to Spot Phony Deepfake Videos this Election Maybe you’ve seen videos where Robert Downey Jr. and...
CVE-2020-16898: “Bad Neighbor”
CVE-2020-16898: “Bad Neighbor” CVSS Score: 8.8 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Overview Today, Microsoft announced a critical vulnerability in the Windows IPv6 stack,...