Articles by Author
McAfee Labs
Analysis of Chrysaor Keylogging Mechanism Shows Power of Simple Malicious Code
Many attacks on mobile devices use social engineering to initially infect a victim’s system. They download malware...May 15, 2017 | 8 MIN READ
Security News
“WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries
Update: The McAfee team has developed a tool that can be used in an effort to recover files...May 12, 2017 | 3 MIN READ
Privacy & Identity Protection
Don’t Let Cybercriminals Give You the Wedding Bell Blues
It’s springtime, which means flowers are blooming, the sun is shining, and wedding season is starting. Back...May 10, 2017 | 4 MIN READ
Mobile Security
Instagram Has Hopped Aboard the 2FA Authentication Train Plus A Quiz for #SocialMediaDay
[os-widget path=”/mcafee/how-safe-are-you-on-social-media” of=”mcafee” comments=”false”] With over 500 million users, Instagram has quickly become one of the top...May 09, 2017 | 4 MIN READ
McAfee News
World Password Day RT to Win Sweepstakes
Terms and Conditions How to Win: Happy World #PasswordDay! Once completed share your results on Twitter and...May 04, 2017 | 9 MIN READ
Privacy & Identity Protection
Is Your Password a Priority? Top Takeaways From Our World Password Survey
Whether you’re signing up for a new video-streaming service, logging back into your email, or checking your...May 03, 2017 | 5 MIN READ
McAfee Labs
Cerber Ransomware Evades Detection With Many Components
This blog was co-written by Sapna Juneja. Cerber is a quickly evolving type of malware called crypto-ransomware....May 02, 2017 | 5 MIN READ
Mobile Security
80% of IoT Apps Not Tested for Security Vulnerabilities, Study Says
We use mobile applications every day, and typically, multiple times throughout the day. They’ve become part of...May 02, 2017 | 3 MIN READ
Privacy & Identity Protection
Are Embedded OEM Device Manufacturers Responsible for Device Security?
The blog was written by Tom Moore. Threats against the Industries Today’s devices are becoming more internet-connected...May 02, 2017 | 2 MIN READ
Privacy & Identity Protection
So, Your Phone Got Stolen. Here’s What to Do.
The Coachella Music and Arts Festival is known for 3 days of desert heat, trendy tunes, and...Apr 27, 2017 | 4 MIN READ
Family Safety
New Family Dynamics As the Connected Lifestyle Grows
“You know that we are living in a digital world and I am a digital girl.” I often...Apr 25, 2017 | 4 MIN READ
Privacy & Identity Protection
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer...Apr 21, 2017 | 3 MIN READ