Featured Blogs
10 Thoughtful (Free) Holiday Gifts to Give Your Friends Year ‘Round
Just a quick poll. What feelings do these digital scenarios evoke: being ghosted, getting trapped in a group text, being...
10 Quick Ways to Spot and Stop Fake News Online
The influence of social media and the sheer reach of information — both true and false — is dominating headlines...
10 Quick Tips for Mobile Security
All day long, it’s almost always within arm’s reach. Your smartphone. And we rely on it plenty. That makes securing...
10 Questions to Ask Yourself Before Snapping and Posting that Photo
Let’s face it. Photos do the talking for most of us today. Everyone is snapping, chatting, posting, and engrossed in...
10 Pro-Active Ways to Dodge the Traps of Identity Thieves
According to the latest reports, digital thieves stole more than $16 billion from consumers in 2016 — that’s up nearly $1...
10 McAfee Women Share Top Career Highlights
Looking to reach your career best? At McAfee, we invest in your growth and development to help you get there....
10 Easy Ways to Clean Up & Curate Your Social Media
People are watching you right now. Like it or not — agree with the intrusion or not — you are...
10 Easy Ways to Build Up Your Family’s Online Security
The events of 2020 didn’t just set significant lifestyle changes in motion. According to a recent study, it also influenced...
10 Back-to-School Tech Tips for Kids, Teens and College Students
Farewell, summer. Hello, back-to-school season! While the chill may not be in the air yet, parents may be feeling the...
10 Artificial Intelligence Buzzwords You Should Know
Artificial intelligence used to be reserved for the population’s most brilliant scientists and isolated in the world’s top laboratories. Now,...
1.1M Emuparadise Accounts Exposed in Data Breach
If you’re an avid gamer or know someone who is, you might be familiar with the retro gaming site Emuparadise....
1-2-3: How to take a screen shot on your computer or mobile phone
There are some simple moves online that can save you an enormous amount of time. And when it comes to...
1,000,000 downloads and growing
With the premiere of Season Two, the hit podcast Hackable? exceeded the 1MM download mark! But the second season is...
‘Whisper’ App: Teens Are Having a Blast but Parents May Gasp
Everyone loves a good secret. Tack anonymity to a whisper and the recipe for juicy fun spikes considerably. That’s the...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
‘SSL Death Alert’ (CVE-2016-8610) Can Cause Denial of Service to OpenSSL Servers
Recently we noticed a security patch has been published for the OpenSSL vulnerability called SSL Death Alert. As with other...
‘Secret Chat’ Messages Aren’t So Secret After All
The universal truth about secrets? They almost always tend to get leaked. This was the case for a cross-platform messaging...
‘Popcorn Time’ Ransomware Sure to Cause Indigestion
In early December the new ransomware “Popcorn Time” was discovered. It gives the victim the option of paying the ransom...
‘Police Ransomware’ Preys on Guilty Consciences
“Police ransomware” is big business, generating millions of euros for organized criminal groups. In May, at Europol’s headquarters in The...
‘Operation Oceansalt’ Delivers Wave After Wave
In the latest findings from the McAfee Advanced Threat Research team, we examine an adversary that was not content with a single campaign, but launched five distinct waves adapted to their separate targets.
‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss
This blog post was written by Rick Simon. Data is leaking out of your organization: accidentally or intentionally, by internals...
‘Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product
Eoin Carroll, Charles McFarland, Kevin McGrath, and Mark Bereza contributed to this report. The Internet of Things promises to make...
‘FakeInstaller’ Leads the Attack on Android Phones
Android.FakeInstaller is a widespread mobile malware family. It has spoofed the Olympic Games Results App, Skype, Flash Player, Opera and...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
‘DHL’ SMS Spam Distributes Android Malware in Germany
One of the most common methods for distributing PC malware is the use of email spam messages that pose as...
‘Bioskits’ Join Ranks of Stealth Malware
We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware...
‘Banking’ Malware Dridex Arrives via Phishing Email
Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques...