Featured Blogs
Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages we send to...
The Parent’s Cybersafety Checklist for Back To School
Sometimes I am not sure which is more stressful – Christmas, or getting kids ready for the school year. So...
Digital Wallets: Safety tips from an industry leader
As digitization gains traction and we move towards a cashless economy, it will be of great help to know how...
Doctoring Data: Why Cybercriminals Have Their Eye on Healthcare
Fun fact: your healthcare data is worth roughly 10 times as much as your credit card number. Well, to a...
Analyzing KillDisk Ransomware, Part 1: Whitelisting
This blog post was written by Sudhanshu Dubey. At McAfee Labs we recently analyzed the ransomware KillDisk. We will share...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
7 Simple Ways to Minimize Risk to Your Family’s Privacy Online
If there is an upside to the torrent of headlines about fake news, intelligence leaks, and email hacking surrounding this...
Trojanized Photo App on Google Play Signs Up Users for Premium Services
Mobile apps usually have names that give some indication of their function. In one recent case, however, we found a...
Turkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed...
What You Need to Know About Security Threats in 2017
2016 has been an exciting year on the tech front, with our hearts being won over by technology ranging from...