3 Tips to a Holistic Online Security Approach
Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your devices, but it can also refer to the processes you put in place to protect yourself from online threats. Whether you’re implementing best practices, building awareness of security threats, or installing security software, taking a holistic approach to online […] more…How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of […] more…Foreign tech workers are avoiding travel to the US
I go to a lot of tech conferences — 13 in 2025 — and many of those I attend are outside the US; several are in London, one is in Amsterdam, another in Paris, and two in Tokyo. Wherever I went this past year, when we weren’t talking about AI, Linux, the cloud, or open-source […] more…22 tech luminaries we lost in 2025
As modern technologies such as artificial intelligence grab today’s headlines, it’s worth remembering that their foundations were being laid more than half a century ago by computer scientists, philosophers, psychologists, developers, entrepreneurs, and more. These pioneers and those who followed tackled issues and solved problems that future generations may never know existed — but without their […] more…Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…Burned out by bots: The rise of prompt fatigue in the workplace
Generative artificial intelligence (genAI) tools have quickly become commonplace in the workplace. In the rush to boost productivity, many organizations have adopted them without fully considering how best to integrate them into daily workflows. Some employees are now complaining of “prompt fatigue” — a kind of cognitive drain similar to the “Zoom fatigue” of the […] more…How IT leaders unlock productivity with Microsoft 365 Copilot
In environments ranging from construction sites to university campuses to legal and retail operations, IT leaders are putting generative AI assistants to work — and discovering how to make them drive productivity. In this article, we focus on Microsoft 365 Copilot, examining real-world experiences that reveal both the promise and the pitfalls of the AI […] more…New Year, New You: Start Fresh With McAfee Protection Score
Are you an online oversharer? Do you give your full birthday to all your online shopping accounts? Have a few companies you have accounts with been breached but you didn’t take any action at the time? If you have bad digital habits, now is an excellent time to reset your digital presence. In isolation, these […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with a look at several quick ways you can quickly get safer online. Now in its 21st year, Cybersecurity Awareness Month marks a long-standing collaboration between the U.S. government and private industry. It’s aim, empower people […] more…All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you find the quickest and best possible path to recovery. Ransomware coverage from McAfee can reimburse you up to $25,0000 for losses resulting from a ransomware threat, including financial losses and ransom fees. You’ll find this […] more…Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…More information
- New Legislation Would Require a Cybersecurity Coordinator in Every State
- DarkSide Ransomware Shutdown: An Exit Scam or Running for Hills?
- Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
- Facebook hoax alert! No, Mark Zuckerberg is not giving $4.5m to people like YOU and ME
- Adobe patches Flash – heads off in-the-wild attacks against Windows and Apple users
- Why Do I Need a Password Manager?
- Evernote Patches Vulnerability in Android App
- United Airlines pays hacker one million air miles in bug bounty reward
- Data breaches exposed over 707 million records in 2015
- Why the NSA should be considered a hostile agency