Featured Blogs
The Parent’s Cybersafety Checklist for Back To School
Sometimes I am not sure which is more stressful – Christmas, or getting kids ready for the school year. So...
Digital Wallets: Safety tips from an industry leader
As digitization gains traction and we move towards a cashless economy, it will be of great help to know how...
Doctoring Data: Why Cybercriminals Have Their Eye on Healthcare
Fun fact: your healthcare data is worth roughly 10 times as much as your credit card number. Well, to a...
Analyzing KillDisk Ransomware, Part 1: Whitelisting
This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. We will share...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
7 Simple Ways to Minimize Risk to Your Family’s Privacy Online
If there is an upside to the torrent of headlines about fake news, intelligence leaks, and email hacking surrounding this...
Trojanized Photo App on Google Play Signs Up Users for Premium Services
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a...
Turkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed...
What You Need to Know About Security Threats in 2017
2016 has been an exciting year on the tech front, with our hearts being won over by technology ranging from...
From Smart Shoes to Safe Routers: Innovation Shines Bright at CES 2017
CES 2017 (the Consumer Electronics Show) has come and gone once again, bringing with it the newest wearables, state-of-the-art tech...
