Author: Gary Davis

Gary Davis Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he works closely with internal teams to drive strategic alignment of products with the needs of the security space. Gary also oversees Intel Security online safety education to educate businesses and consumers by distilling complex security topics into easily understandable and actionable advice. During his 5+ years at Intel Security, he has held leadership roles in the consumer and enterprise divisions where he has helped shape various product portfolios and strategic direction along with advocating for cybersecurity education. Gary has appeared on multiple business, security and consumer lifestyle broadcast outlets, including CBS News, CNBC, FOX News, Bloomberg, WSJ MoneyBeat and several Bay Area television stations; and quoted in the New York Times, the Wall Street Journal, USA Today, Money Magazine, CNN, Forbes, TIME Magazine, LA Times, Huffington Post, MSNBC, PC Magazine, CNET, CSO Magazine, and PC World. He is a sought-after speaker discussing the state of and trends in digital security. Prior to joining McAfee, he held senior management positions for more than 15 years in technology companies. Gary served on the board of directors of the National Cyber Security Alliance (NCSA). Twitter: @garyjdavis. / McAfee Blog. For media requests, please contact craig.sirois@intel.com or mary.salvaggio@intel.com

We often take daily conveniences for granted, and the credit card is no exception. These pieces of plastic allow us to set up reoccurring payments and buy items on any spur-of-the-moment whim. But with all this convenience comes risk. Cybercriminals constantly seek access to our money, and financial institutions combat them with ever-evolving safety features. […]

  As smartphones get more sophisticated, it’s easy to forget their humble origins. Through today’s mobile apps, we can manage finances, order Ubers, and even do office work from the beach. But remember old-school flip-phones? They stood for one purpose – simply to make calls – and we all had them. Well, it turns out […]

Most people have heard the story of the Trojan horse. We’ve learned the moral of that story: don’t trust gifts from strangers. Today, nobody would use a giant horse statue – except maybe pranksters with a bad sense of humor – although similar tricks exist in digital form. People are wary of unknown .exe files […]

Microsoft Word is omnipresent. Students use it for their academic careers and office workers, well, office workers pretty much live in Word files. However, the program’s ubiquity is a useful tool for cybercriminals, who have for a long time infected Word files with malware. It’s an old standby that’s constantly updated to stick with the […]

YouTube videos are like today’s candid camera: they can be fun, educational, and, sometimes, a window into someone else’s most embarrassing moments. But videos we watch could just as easily flip the tables and allow intrusions into our own lives. How? By containing secret instructions capable of triggering voice-recognition tools on our smartphones. It just […]