Featured Blogs
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
Gift Card Scams: The Gift That Keeps on Taking
Gift card scams cost consumers millions each year. Learn the common types of gift card fraud, how scammers trick victims, and tips to protect your money.
Gift Your Kids The Know-How To Maintain A Healthy Digital Reputation
The Digital India initiative by the Government of India is aimed at ushering in a digitally empowered society. One of...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Giving Back: McAfee Global Community Service Day
This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
