Featured Blogs
Have You Had the ‘Dangerous Celebrity’ Talk with Your Kids?
By now hopefully you’ve had several critical conversations with your child about the good, the bad, and the risky of...
Have You Checked Your Teens’ Phone for the Burnbook App?
Every few months a new mobile app surfaces on the social landscape that quickly catches on. And, yes, parent—you need...
Have Fun in the Sun this Summer with the Summer Safety #RT2Win Sweepstakes!
The school year has come to an end, and with it comes the start of summer! For many, this time...
Have a Tweeting Teen in Your House? Here’s What You Need to Know
Twitter has evolved over the past decade to mean different things to different people. For adults, the platform has morphed...
Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes...
Hardware Hack Bypasses iPhone PIN Security Counter
A security researcher from the University of Cambridge has found a way to hack the iPhone NAND memory hardware to...
Happy New Year 2019! Anatova is here!
During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name...
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities
Hang Up on Hackers: Protect Yourself from Mobile App Video Conferencing Vulnerabilities Whether they’re attending regular work meetings or catching...
Handling Social Media Stress for Teens
Our society is undeniably superbly interconnected, and our digital persona is greatly treasured. However, this isn't always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress.
Hancitor Making Use of Cookies to Prevent URL Scraping
This blog was written by Vallabh Chole & Oliver Devane Over the years, the cybersecurity industry has seen many threats...
HANCITOR DOC drops via CLIPBOARD
By Sriram P & Lakshya Mathur Hancitor, a loader that provides Malware as a Service, has been observed distributing malware such as...
Hallucinating Headlines: The AI-Powered Rise of Fake News
The number of AI-powered fake news sites has now surpassed the number of real local newspaper sites in the U.S....
Hacktivists Turn to Phishing to Fund Their Causes
At McAfee we recently observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress...
Hacking Your Phone and the Internet of Things
Wouldn’t it be fantastic if your refrigerator could inform you when it was out of milk, or vegetables? And wouldn’t...
Hacking the Human OS: A Report on Social Engineering
Why are data breaches so commonplace? Whether the attacks are against the energy sector as reported July 2014[i] with over...
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Hacking Humans: How Cybercriminals Trick Their Victims
McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...
Hackers Trick Staff Into Exposing Major Companies’ Salesforce Data–Find Out if You’re Safe
Cybercriminals tricked employees at major global companies into handing over Salesforce access and used that access to steal millions of...
