Caption by: Ed Bott
Want proof that the bad guys are starting to target Mac users? Take a look at this series of screens, which show an attempt to convince a user to install a fake antivirus program that has a nasty payload
Top vehicle hacking examples (in pictures)
Researchers have demonstrated everything from running cars off the road to remotely controlling your brakes.
iOS 12: Change these privacy and security settings now
Here are the steps you should take to lock down an iPhone or iPad running iOS 12.
Simple steps to erase your digital footprint
Need help wiping the slate clean? Here are some instructions on removing and wiping services most likely to store your data and online activities.
How to spot a fake ICO (in pictures)
Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fraudulent and what is legitimate?
The worst cyberattacks undertaken by nation-state hackers
These are the worst known cyberattacks which are believed to be the work of hackers backed by governments and ruling parties worldwide.
How to discover and destroy spyware on your smartphone (in pictures)
If you suspect your device has been tampered with, follow these steps.
McAfee opens Advanced Threat Research Lab