Mary James
Mary James is a digital privacy and security writer at All About Cookies with over seven years of experience helping everyday users navigate the products and threats that define modern digital life.
Across more than 340 articles at All About Cookies, Mary has developed particular depth in VPNs, antivirus software, ad blockers, identity theft protection, and parental controls — consistently translating technical security concepts into guidance that's useful for readers without a security background. She has personally tested more than 75 security and privacy products, evaluating each on Mac, PC, and iPhone to reflect how real users across different platforms experience them.
Before joining All About Cookies, Mary worked in content creation and sales at PC Matic, a U.S.-based antivirus software company, where she developed firsthand familiarity with how consumer security products are built, positioned, and tested against real-world threats. That industry-side experience informs how she evaluates products today — including how marketing claims hold up against actual performance.
Mary holds a B.S. in Liberal Arts from Clarion University and an M.F.A. in Playwriting and Screenwriting from Point Park University. Her communication background shapes her ability to make complex threat scenarios and product trade-offs clear and actionable for non-technical audiences. Her work has appeared in MSN and CNBC.
When she's not writing, Mary can be found at her local theatre or exploring the outdoors.
- MSN
- CNBC
- PC Matic
- VPNs
- Antivirus
- Identity Theft
- Ad Blockers
- Password Managers
- Parental Controls
- Credit Monitoring
- Online Privacy
- Data Security
- B.S. in Liberal Arts from Clarion University
- M.F.A. in Creative Writing from Point Park University
- Mac or PC: Both
- Android or iOS: iPhone
Mary's Latest Articles
-
VyprVPN Review 2026: A Security Powerhouse
VyprVPN is a security superstar that delivered on fast speeds during our testing, top security, and proprietary servers that will keep your device protected for a low cost.
-
How To Avoid Spam by Masking Your Email Across the Web
Spam email isn’t just annoying, it can also contain harmful malware; email masking can keep your email address private and secure.
-
The Best VPNs of 2026: Independently Tested and Editor-Approved
In our second-year Editors' Choice VPN Awards, we explore all of our tried and tested VPNs to name the best VPN services.
-
Adblock Plus Review 2026: This Free Extension Secures Your Data
Browsing the internet can be a clutter-filled and even dangerous experience, but Adblock Plus is trying to change all that with its free service.
-
How To Identify and Remove the MSASCuiL.exe Virus
The MSASCuiL.exe executable is not a virus. Learn how this file can be used to install malware and what you can do to prevent the infection from taking over your computer.
-
What is 6G Internet? A Guide to the Next Generation of Mobile Communication
Understanding the potential of 6G and how it will transform the way we connect, care, and collaborate
-
Mozilla VPN Review 2026: Do Its Security Features Measure Up?
Explore our testing experience with Mozilla’s VPN, and see whether it’s the right choice for your online security needs.
-
Application Whitelisting and How It Better Protects You
Application whitelisting is a buzzword in the tech community, but what is it and how can it be harnessed to make the internet a safer space for everyone?
-
The Best VPNs for School and College 2026
Unlock freedom on your school or college network with a VPN that is built to help you get the most from the internet.
-
How To Keep Seniors Safe in the Digital Age: A Social Media Guide
We've put together an in-depth guide for both seniors and caretakers that looks at common forms of social media fraud, how to prevent them, and resources for when you get scammed.
-
Is COM Surrogate a Virus or a Legitimate Process?
Uncovering the truth about COM Surrogate: What it is, what it does, and how to protect your PC.
-
6 Simple Steps to Protect Your Phone and Webcam from Hackers
Maximize your online security: A step-by-step guide to protecting your phone and webcam from hackers.
-
Hotspot Shield Review 2026: Does It Secure Your Data?
Our Hotspot Shield review explores the pros and cons of its security measures, speed, compatibility, and user-friendliness.
-
How To Disable McAfee Antivirus: A Comprehensive Guide
Learn the simple and effective way to temporarily or permanently disable McAfee antivirus on your device.
-
What Is Phishing-as-a-Service and How Can Anyone Become a Hacker?
Uncovering the definition, methods, and consequences of phishing-as-a-service, as well as how to protect yourself.
-
The Dangers of IP Spoofing and How to Protect Yourself
IP spoofing can affect your security. Learn how to use a VPN to mask your IP address and protect against IP spoofing attacks like DDoS, MitM, and more.
-
How to Log in to a Linksys Router: Step-by-Step Guide
Unlock the full potential of your Linksys router with these easy login steps and troubleshooting tips.
-
18 Facebook Marketplace Scams (And How To Avoid Becoming a Victim)
Ecommerce opens up a broad array of goods, services, and job opportunities in our interconnected world. Make sure you know what’s legit online before handing over cash or information.
-
What Is a Man-in-the-Middle Attack and How Can You Stay Safe?
Man-in-the-middle (MitM) attacks intercept your web communications, allowing hackers to steal your login credentials and financial data. But MitM attacks are preventable with the right tools and online safety practices.
-
What You Should Know About the 5 Eyes, 9 Eyes, and 14 Eyes Alliances
The 5, 9, and 14 Eyes countries are likely surveying your internet activity, but a VPN from a non-alliance country could save your privacy.
-
WebRTC Leaks: What Are They and How Can I Prevent Them?
WebRTC leaks can threaten your anonymity online — here’s how you can prevent them and stay safe.