Category: McAfee Blogs

How to Protect Your Social Media Accounts

This article has been indexed from McAfee Blogs Social media is part of our social fabric. So much so that nearly 50% of the global population are social… The post How to Protect Your Social Media Accounts appeared first on…

What to Do If Your Identity Has Been Stolen

This article has been indexed from McAfee Blogs We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The… The post What to Do If Your Identity Has Been Stolen appeared…

The Dark Web: A Definitive Guide

This article has been indexed from McAfee Blogs The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay… The post The Dark Web: A Definitive Guide appeared first on McAfee…

Protecting Your Privacy This Year

This article has been indexed from McAfee Blogs If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our… The post Protecting Your Privacy This Year appeared first on McAfee Blogs.…

The Feeling of Safety

This article has been indexed from McAfee Blogs The internet’s greatest feat? Fundamentally shifting how we live. Once a revelation, it quickly set our long-standing beliefs about how… The post The Feeling of Safety appeared first on McAfee Blogs. Read…

Technical Analysis of CVE-2021-1732

This article has been indexed from McAfee Blogs Introduction In February 2021, the company Dbappsecurity discovered a sample in the wild that exploited a zero-day vulnerability on Windows… The post Technical Analysis of CVE-2021-1732 appeared first on McAfee Blogs. Read…

The Bug Report – December 2021

This article has been indexed from McAfee Blogs Your Cybersecurity Comic Relief  Why am I here?  If you’re reading these words, CONGRATULATIONS! You’ve made it to 2022! And even better,… The post The Bug Report – December 2021 appeared first on McAfee…

The Internet is for Everyone to Enjoy—We’re Helping See to It

This article has been indexed from McAfee Blogs The internet is meant for all to enjoy. And that’s who we’re looking out for—you and everyone who wants to enjoy life online.  We believe it’s important that… The post The Internet is for Everyone to Enjoy—We’re Helping See to…

Threat Intelligence and Protections Update Log4Shell CVE-2021-44228

This article has been indexed from McAfee Blogs Threat Summary Log4j/Log4shell is a remote code execution vulnerability (RCE) in Apache software allowing attackers unauthenticated access into the remote… The post Threat Intelligence and Protections Update Log4Shell CVE-2021-44228 appeared first on…

9 Ways to Determine If Your Identity Has Been Stolen

This article has been indexed from McAfee Blogs Most of us use the internet every day, so we’re comfortable sharing a lot of information online. However, cybercriminals want… The post 9 Ways to Determine If Your Identity Has Been Stolen…

Helping Older Adults Build Strong Digital Literacy Skills

This article has been indexed from McAfee Blogs Most of us take our skills for granted when it comes to technology. We move effortlessly between applications and multiple devices. We install new software, set up numerous accounts, and easily clear technical hurdles that come our… The post Helping Older Adults Build Strong Digital Literacy Skills appeared first…

10 Ways to Protect Your Identity

This article has been indexed from McAfee Blogs We’re online more than ever, in large part because it allows us to take advantage of online conveniences like bill… The post 10 Ways to Protect Your Identity appeared first on McAfee…

5 Common Types of Identity Theft

This article has been indexed from McAfee Blogs The internet provides plenty of fun and exciting opportunities for you and your family, from sharing on social media to… The post 5 Common Types of Identity Theft appeared first on McAfee…

Log4J and The Memory That Knew Too Much

This article has been indexed from McAfee Blogs By Guilherme Venere, Ismael Valenzuela, Carlos Diaz, Cesar Vargas, Leandro Costantino, Juan Olle, Jose Luis Sanchez Martinez, AC3 Team Collaborators:… The post Log4J and The Memory That Knew Too Much appeared first…

Privacy, Identity, and Device Protection: Why You Need to Invest in All Three

This article has been indexed from McAfee Blogs Cybercriminals make people uneasy about the safety of their identity and online accounts. McAfee is your partner who’ll work tirelessly to restore your confidence in your online activities. Check out this roundup… The post Privacy, Identity, and Device Protection: Why You Need to Invest…

How To Tell If Your Smartphone Has Been Hacked

This article has been indexed from McAfee Blogs Something’s not right. Maybe your phone is losing its charge way too quickly. Or one day it suddenly starts turning… The post How To Tell If Your Smartphone Has Been Hacked appeared…

Does Your Child Have an Unhealthy Relationship with Social Media?

This article has been indexed from McAfee Blogs Have you noticed that when parents gather, it doesn’t take long before the topic of kids and social media comes up. That’s because concern over screen time is a big… The post Does Your Child Have an Unhealthy Relationship with Social Media?…

What Is SIM Swapping? 3 Ways to Protect Your Smartphone

This article has been indexed from McAfee Blogs You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in… The post What Is SIM Swapping? 3 Ways to Protect Your Smartphone…

The Bug Report – November Edition

This article has been indexed from McAfee Blogs Your Cybersecurity Comic Relief  CVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” … The post The Bug Report – November Edition appeared first on McAfee…

Fighting Supply Chain Threats Is Complicated

This article has been indexed from McAfee Blogs Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. And yet that is the… The post Fighting Supply Chain Threats Is Complicated appeared first on McAfee…

How to Help Your Kids Combat Clickbait Scams

This article has been indexed from McAfee Blogs We’ve all fallen for clickbait. Sometimes it’s a juicy headline designed to spark curiosity and drive traffic to a specific website. Other… The post How to Help Your Kids Combat Clickbait Scams appeared first…

Social Engineering: Tis the Season for Tricky Hackers

This article has been indexed from McAfee Blogs With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the… The post Social Engineering: Tis the Season for Tricky Hackers appeared first…

What is the Dark Web? Everything You Need to Know

This article has been indexed from McAfee Blogs You open up your laptop and check the daily news. You see a headline stating that one of your favorite online retailers was breached and that thousands of… The post What is the Dark Web? Everything You Need to Know…

My email has been hacked! What should I do next?

This article has been indexed from McAfee Blogs If you find that your email has been hacked, one of your immediate reactions is wondering what you should next.   The answer: take a… The post My email has been hacked! What should I do next?…

Global Technology Provider Looks to MVISION Unified Cloud Edge

This article has been indexed from McAfee Blogs With the acceleration of cloud migration initiatives—partly arising the need to support a remote workforce during the pandemic and beyond—enterprises… The post Global Technology Provider Looks to MVISION Unified Cloud Edge appeared…

Zero Care About Zero Days

This article has been indexed from McAfee Blogs The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about… The post Zero Care About Zero Days appeared first on McAfee Blogs.…

Ransomware Threats Affecting the Public Sector

This article has been indexed from McAfee Blogs In the October 2021 Threat Report, McAfee Enterprise ATR provides a global view of the top threats, especially those ransomware… The post Ransomware Threats Affecting the Public Sector appeared first on McAfee…

Qualities of a Highly Available Cloud

This article has been indexed from McAfee Blogs With the widespread adoption of hybrid work models across enterprises for promoting flexible work culture in a post pandemic world,… The post Qualities of a Highly Available Cloud appeared first on McAfee…

How to Live a Digital Life Free of Spyware

This article has been indexed from McAfee Blogs Spyware is tricky. Some types notify users that they’re monitoring activity. Others function in stealth mode and use the information they collect for nefarious… The post How to Live a Digital Life Free of Spyware appeared…

Veterans Day & Remembrance Day 2021

This article has been indexed from McAfee Blogs November 11 marks Veterans Day in the United States and Remembrance Day across Europe and beyond. Wherever you may be… The post Veterans Day & Remembrance Day 2021 appeared first on McAfee…

Protecting Yourself in the Wake of the Robinhood Data Breach

This article has been indexed from McAfee Blogs The Robinhood trading platform recently disclosed a data breach that exposed the information of millions of its customers. News of the attack was released on Monday, November 8th along with word the… The post Protecting Yourself in the Wake of the Robinhood Data Breach…

Telegram – What Parents Need To Know Now

This article has been indexed from McAfee Blogs If you hadn’t heard of Telegram till 2021 then you wouldn’t be alone. This relatively unknown messaging and social media… The post Telegram – What Parents Need To Know Now appeared first…

The Bug Report – October Edition

This article has been indexed from McAfee Blogs Your Cyber Security Comic Relief Apache server version 2.4.50 (CVE-2021-42013) Why am I here? Regardless of the origins, you’ve arrived… The post The Bug Report – October Edition appeared first on McAfee…

Squid Game App or Mobile Malware in Disguise?

This article has been indexed from McAfee Blogs It’s safe to say that many Americans are obsessed with Squid Game. According to Business Insider, the Korean drama series has driven the newest engagers to a Netflix… The post Squid Game App or Mobile Malware in Disguise? appeared first…

What Do Social Media Companies Know About You?

This article has been indexed from McAfee Blogs What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you… The post What Do Social Media Companies Know About You? appeared first…

McAfee Enterprise & FireEye 2022 Threat Predictions

This article has been indexed from McAfee Blogs What cyber security threats should enterprises look out for in 2022? Ransomware, nation states, social media and the shifting reliance… The post McAfee Enterprise & FireEye 2022 Threat Predictions appeared first on…

McAfee Enterprise & FireEye 2022 Threat Predictions

This article has been indexed from McAfee Blogs What cyber security threats should enterprises look out for in 2022? Ransomware, nation states, social media and the shifting reliance… The post McAfee Enterprise & FireEye 2022 Threat Predictions appeared first on…

Staying Cyber Aware and Safer from Ransomware

This article has been indexed from McAfee Blogs Ransomware – A truly frightening cyber security topic It’s October, and at McAfee we love celebrating spooky season. As McAfee’s Chief Technology Officer,… The post Staying Cyber Aware and Safer from Ransomware appeared first on…

How to Report Identity Theft to Social Security

This article has been indexed from McAfee Blogs In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can… The post How to Report Identity Theft to Social Security appeared first…

How to Secure All Your Everyday Connected Devices

This article has been indexed from McAfee Blogs Take a roll call of all your devices that connect to the internet. These include the obvious ones – laptops, tablets, and your smartphone…. The post How to Secure All Your Everyday Connected Devices appeared first…

Top Signs of Identity Theft

This article has been indexed from McAfee Blogs When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a sign of identity theft.  A missing… The post Top Signs of Identity Theft appeared first on McAfee Blogs.…

5 Ways to Get Kids Focused on Their Online Privacy

This article has been indexed from McAfee Blogs Kids engage online far differently than adults. Between group chats, social apps, and keeping up with digital trends, their interests, and attention spans constantly shift, which means online privacy… The post 5 Ways to Get Kids Focused on Their Online Privacy…

Shaping the Future of Cybersecurity

This article has been indexed from McAfee Blogs Today marks a significant and exciting step forward for the combined McAfee Enterprise and FireEye businesses as we create a… The post Shaping the Future of Cybersecurity appeared first on McAfee Blogs.…

How to Check if Someone is Using Your Identity

This article has been indexed from McAfee Blogs A good time to check if someone is using your identity is before it even happens.  One of identity theft’s several downsides is how people discover they’ve… The post How to Check if Someone is Using Your Identity appeared…

McAfee Enterprise Is Ready for Windows 11, Are You?

This article has been indexed from McAfee Blogs McAfee Enterprise is prepared to protect our customers from day 1 of their journey with the new Windows 11 release…. The post McAfee Enterprise Is Ready for Windows 11, Are You? appeared…

Do your part and #BeCyberSmart with these online safety tips

This article has been indexed from McAfee Blogs We hope you’ve enjoyed Cyber Awareness month. This year’s theme asked us all to do our part to stay safer online. The idea is that if we each… The post Do your part and #BeCyberSmart with these online safety tips…