Featured Blogs
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
How to Stay Safe while Working from Home
Working from home has established itself as a norm. As of 2023, 35% of employed adults in the U.S. work...
What Parents Need to Know About KIK Messenger App
We write a lot about new apps on this blog because apps are hot in the very mobile teen world....
It’s ‘Game Over’ for Zeus and CryptoLocker
Under Operation Tovar, global law enforcement—in conjunction with the private sector and McAfee—has launched an action to dismantle the Gameover...
KRACK Hack Threatens Wi-Fi Security – What it Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord...
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
Teen Slang and Texting Acronyms Parents Should Know
If you pick up your teen’s phone on any given day, chances are the next stop you make will be...
McAfee Labs Unlocks LeChiffre Ransomware
At McAfee Labs we recently received a low-profile ransomware called LeChiffre. Unlike ransomware that is distributed by a spam campaign or...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
“WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries
Update: The McAfee team has developed a tool that can be used in an effort to recover files that have been...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
How to Reset Your Gmail Password After Being Hacked
If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your...
Bypassing Microsoft’s Patch for the Sandworm Zero Day
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out...
New VPNFilter Malware Contains Kill Switch, Infects Over 500,000 Devices
Routers are the driving force behind a lot of our modern-day internet use. They power our Wi-Fi, and therefore our...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...