Featured Blogs
Hackers Pull off a Crafty Attack on Michaels
Customers of nationwide arts and crafts retailer, Michaels, may have something messier to clean up than their latest DIY creation....
Hackers Tee Up a Ransomware Attack for the PGA Ahead of the 2018 Championship
Fore! That’s not a ball hitting the 9th hole, that’s a ransomware attack. You heard correctly – the PGA (Professional...
Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe
Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of...
Hacking Humans: How Cybercriminals Trick Their Victims
McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Hacking the Human OS: A Report on Social Engineering
Why are data breaches so commonplace? Whether the attacks are against the energy sector as reported July 2014[i] with over...
Hacking Your Phone and the Internet of Things
Wouldn’t it be fantastic if your refrigerator could inform you when it was out of milk, or vegetables? And wouldn’t...
Hacktivists Turn to Phishing to Fund Their Causes
At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...
Hallucinating Headlines: The AI-Powered Rise of Fake News
The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....
