Featured Blogs
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
Be on the Lookout for a New Wave of QR Code Scams
In a world of contact-free pickup and payments, an old hacker’s trick is getting a new look—phony QR code scams. ...
Organized Cybercrime: The Big Business Behind Hacks and Attacks
There’s a person behind every cybercrime. That’s easy to lose sight of. After all, cybercrime can feel a little anonymous,...
Staying Cyber Aware and Safer from Ransomware
Ransomware – A truly frightening cyber security topic It’s October, and at McAfee we love celebrating spooky season. As McAfee’s Chief Technology Officer,...
What Do Social Media Companies Know About You?
What do social media companies really know about you? It’s a fair question. And the quick answer is this: the more you...
Squid Game App or Mobile Malware in Disguise?
It’s safe to say that many Americans are obsessed with Squid Game. According to Business Insider, the Korean drama series has driven the newest engagers to a Netflix...
The Ultimate Holiday Shopping Guide
The holidays are almost here! That means it’s time to start making your list and checking it twice. To help prepare you for...
Squid Game Cryptocurrency Scam
It’s little surprise that a digital currency scam based on the popular Squid Games series on Netflix is making the news. If you haven’t...
Telegram – What Parents Need To Know Now
If you hadn’t heard of Telegram till 2021 then you wouldn’t be alone. This relatively unknown messaging and social media...
Protecting Yourself in the Wake of the Robinhood Data Breach
The Robinhood trading platform recently disclosed a data breach that exposed the information of millions of its customers. News of the attack was released on Monday, November 8th along with word the...
The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.
Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...
How to Live a Digital Life Free of Spyware
Spyware is tricky. Some types notify users that they’re monitoring activity. Others function in stealth mode and use the information they collect for nefarious...
7 Common Digital Behaviors that Put Your Family’s Privacy at Risk
It would be impossible nowadays to separate our everyday lives from technology. We travel well-worn, comfortable paths online and engage...
How I Got Here: Trevor’s Career Journey Across Four Countries and Five Roles
In this career-journey series, Marketing Director Trevor shares why patient listening is the most helpful skill he’s acquired, the top...
5 Signs Your Device May be Infected with Malware or a Virus
The malware landscape is growing more complex by the minute, which means that no device under your family’s roof—be it...
‘Tis the Season for Scams
Co-authored by: Sriram P and Deepak Setty ‘Tis the season for scams. Well, honestly, it’s always scam season somewhere. In...
Social Engineering: Tis the Season for Tricky Hackers
With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the...
How to Help Your Kids Combat Clickbait Scams
We’ve all fallen for clickbait. Sometimes it’s a juicy headline designed to spark curiosity and drive traffic to a specific website. Other...