Featured Blogs
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
How to Stay Safe while Working from Home
Working from home has established itself as a norm. As of 2023, 35% of employed adults in the U.S. work...
What Parents Need to Know About KIK Messenger App
We write a lot about new apps on this blog because apps are hot in the very mobile teen world....
It’s ‘Game Over’ for Zeus and CryptoLocker
Under Operation Tovar, global law enforcement—in conjunction with the private sector and McAfee—has launched an action to dismantle the Gameover...
KRACK Hack Threatens Wi-Fi Security – What it Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord...
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
Teen Slang and Texting Acronyms Parents Should Know
If you pick up your teen’s phone on any given day, chances are the next stop you make will be...
McAfee Labs Unlocks LeChiffre Ransomware
At McAfee Labs we recently received a low-profile ransomware called LeChiffre. Unlike ransomware that is distributed by a spam campaign or...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
“WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries
Update: The McAfee team has developed a tool that can be used in an effort to recover files that have been...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
How to Reset Your Gmail Password After Being Hacked
If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your...
Bypassing Microsoft’s Patch for the Sandworm Zero Day
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out...
New VPNFilter Malware Contains Kill Switch, Infects Over 500,000 Devices
Routers are the driving force behind a lot of our modern-day internet use. They power our Wi-Fi, and therefore our...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...
Have You Checked Your Teens’ Phone for the Burnbook App?
Every few months a new mobile app surfaces on the social landscape that quickly catches on. And, yes, parent—you need...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in 2017. Now, 2018...
2018 Texting Slang Update: How to Decode What Your Teen is Saying Online
Every year we update our teen slang and this year we’ve added a handful of terms that may make your...
How to Protect Yourself From a Spear Phishing Scam
As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
What is Wardriving?
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...
Why the New Flinch App is Far From Family Friendly
It’s called Flinch and the idea behind this new app echoes an innocent childhood game: Stare at the other person...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...