Featured Blogs
XcodeGhost Pulled from App Store After a Good Scare: What to Know
This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
Yahoo Ads Serve Mobile Fake Alerts
“Android Armour,” a malicious knockoff of Armor For Android, has been circulating for some time with no end in sight, perhaps...
Yahoo! Hacked: 15 Tips To Better Password Security
In light of the Yahoo Voices hack where 450,000 passwords have been compromised, it’s time again to let the world...
Yik Yak & Omegle: Two Apps Kids Need to Delete ASAP
So I’ve been trying to put myself in the shoes of people who can’t seem to get enough of using...
YOLO: What Parents Need to Know About the Anonymity App Kids Use with Snapchat
If your kids use Snapchat, chances are they also use the popular new app YOLO along with it. Since it’s...
You Bring the Yoga Mat, McAfee Brings the Goats
Yogis are likely familiar with the term vinyasa, but have you heard of caprine vinyasa? Caprine vinyasa elevates your standard...
You Could Get Prank Called (and Charged) By Your Own Phone
Most people would never think to prank call themselves. However, they may be allowing their smart phones to do just...
You Might Not Be a Celebrity, But You Could Still Get Hacked
In 2016, there’s a ‘who’s who’ of A-list celebrities. No, it’s not who was invited to the Academy Awards or...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
You, Your Company, and BYOD: A Love Triangle
BYOD, or bring your own device, has become the new normal in the corporate workplace. But with this convenience comes...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
Your Back To School Tech Plan
I am such a fan of school holidays! No music lessons, no sport, no commitments. Bliss!! The crazy school term...
Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set...
Your Identity Takes Flight With Angry Birds’ Data Sharing Policies
Back in the heyday before the Internet, and even before the telephone, there was one somewhat-reliable way of spreading information...
Your Kids Are My Problem, Here’s Why
This post was written by Jessica Brookes Snow falls outside the large steamy windows at a popular coffee shop in...
Your mobile apps could be spying on you and telling secrets!
I am sharing this article, written by Shelly Tzoumas – Thanks, Shelly! How close are relentless cyber criminals to hacking...
Your Mobile Lucky Charm
Happy St. Patrick’s Day! While today was originally established to honor the life of St. Patrick, over time the holiday...
Your Phone Is the #1 Target in a New Wave of IRS Scams, McAfee Finds
As Tax Day looms and last-minute taxpayers feel the pressure, a surge of IRS scams is on the rise. Research...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Youth & Social Media
The digital world is here to stay. The youth are growing up with and making internet technologies, such as social...
YouTube Video Scam Targets Facebook Users
Be advised cybercriminals are at it again, leveraging the popularity of Facebook and YouTube to scam consumers.We have seen several...
You’ve Got Mail — But it Might be a ‘Spoof’
As Internet users everywhere are on heightened alert following the discovery of the password-compromising Heartbleed bug earlier this month, it...
Zbot Botnet Steals Thousands of Credentials
In McAfee Labs we keep a close eye on the Zeus/Zbot/Gamover botnet malware that is responsible of thousands of samples...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...