Featured Blogs
Ready, Set, Shop: Enjoy Amazon Prime Day Without the Phishing Scams
For many, Amazon Prime Day is an opportunity to score some great deals. For hackers, Amazon’s annual discount shopping campaign is an...
Stay Connected and Protected During Work, School, and Play
Stay Connected and Protected During Work, School, and Play These days, work and home mean practically the same thing. Our...
End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying
Bullying can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate.
How To Spot Tech Support Scams
When something goes wrong with your computer or devices, it can cause a panic. After all, most of us...
#BeCyberSmart: Equipping Kids to Stay Safe on New Video Apps
These days, spending time with friends face-to-face still isn’t always an option for teens. So, finding a fun, new app...
Proliferation of Mobile Devices: The Impact on Consumer Security
As the use of mobile devices continues to skyrocket worldwide, a new danger is silently emerging against consumers. This article delves into the deep end of how the proliferation of mobile devices is impacting consumer security
Election 2020 – Fake Election Websites: Five Tips So You Don’t Get Fooled
Election 2020 – Fake Election Websites: Five Tips So You Don’t Get Fooled When you spot a .GOV web domain...
Election 2020 – Keep Misinformation from Undermining the Vote
Election 2020 – Keep Misinformation from Undermining the Vote On September 22nd, the Federal Bureau of Investigation (FBI) and the...
Celebrating multi-national cultures this Hispanic Heritage Month
Do you know the difference between Hispanic and Latino? What about the traditions that are important parts of the Hispanic...
Do You Know the Legal Consequences of Sexting?
While sexting may seem harmless or even fun to some individuals, it is essential to understand its legal implications, particularly when it involves minors. This article will shine a light on the legal consequences of sexting, with an aim to educate readers about this increasingly common issue.
Our Experiences Participating in Microsoft’s Azure Sphere Bounty Program
From June to August, part of the McAfee Advanced Threat Research (ATR) team participated in Microsoft’s Azure Sphere Research Challenge. Our research resulted...
Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List
Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet for...
How Searching For Your Favourite Celebrity May Not End Well
How Searching For Your Favourite Celebrity May Not End Well 2020 has certainly been the year for online entertainment. With...
Check Out the McAfee Most Dangerous Celebrity 2020
Attention Streamers: Check Out the McAfee Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet...
Most Dangerous Celebrity 2020 Sweepstakes
McAfee “Most Famous to Most Dangerous to Search for Online” 2020 MDC Sweepstakes Terms and Conditions NO PURCHASE OR PAYMENT...
Cybersecurity Awareness Month: If You Connect It, Protect It
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
Convenience vs. Online Security: Have Your Cake and Eat It Too
Convenience vs. Online Security: Have Your Cake and Eat It Too We live in a world where convenience is king....
Securing Space 4.0 – One Small Step or a Giant Leap? Part 1
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Do the Benefits of Bitcoin Outweigh the Risks?
Cryptocurrencies like Bitcoin are the future of tomorrow’s digital payment system—or are they? The same benefits that make them a popular choice with online users have also made them popular amongst online thieves, sparking a wave of ransomware attacks in the last few years. This begs the question: do the ...
Make a Hacker’s Job Harder with Two-step Verification
Using identical passwords is convenient for us as users, but it’s also convenient for any hacker trying to steal personal information—once a hacker has access to one of your accounts, he can use a recycled password to snoop around at will.
Why Should You be Careful When Using Hotspots or Free Wi-Fi?
The ability to be connected anywhere, anytime is extraordinary, but it also presents a significant security concern. Unsecured Wi-Fi networks can expose our personal and sensitive data to potential hackers.
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts
Election 2020 – Five Tips to Secure a Mail-In Ballot That Counts Forecasts predict that roughly 80 million votes will...
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...
8 Ways to Help Senior Adults Stay Safe Online These Days
8 Ways to Help Senior Adults Stay Safe Online These Days Technology has come in handy for most of us...
Stay Connected & Protected: Weaving Security Into Our Social Media Habits
Stay Connected & Protected: Weaving Security Into Our Social Media Habits Today, there are so many different avenues where we...
Career change? Cybersecurity companies are hiring.
Career change? Cybersecurity companies are hiring. If you’re thinking career change or career shift, there’s a field that has an...