Featured Blogs
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...
Summer Refresh: Take Time to Relax but Not on Password Security
With summer comes permission to relax a little more, sun a little more, and fun a little more. But, as...
Summer Scam Alerts: Don’t Let Crooks Wreck Your Family Travel Plans
While our click-and-pay digital lifestyle makes accessing travel and entertainment more convenient, for every app or website we loop into...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Suntan, Sunglasses, Suitcases… and Devices! Indians Find It Hard to Unplug on Vacations
I was showing a friend around Kolkata when we noted several tourists (very evident because of their attire and photographic...
Super Mario Run Has Cybercriminals Sprinting to Exploit the Hype
Nintendo, one of the most popular gaming companies of the past two decades, has finally released its first game exclusively...
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game
Cybercriminals will always try to cash in on a good thing, and football is no exception. Online scammers are ramping...
Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and...
Supporting the Women Most Affected by the Pandemic
Supporting the Women Hit Hardest by the Pandemic Only 57% of women in the U.S. are working or looking for...
Survey: Kids Using Devices in School for More than Just Learning
August marks the start of a new school year and with that comes new concerns for parents of digital kids....
Survey: More Than Half of Travelers Couldn’t Unplug on Vacation
Everybody knows it, everybody admits it, and everybody seems to accept it. We’re addicted to our mobile phones. While over-attachment...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
Syrian Crisis Reminds Us to Beware of ‘Charity’ Scams
The dismal situation in Syria has gained considerable sympathy in the rest of the world. Unfortunately, playing on our emotions...
T-Mobile’s data breach exposes the personal data of 40 million
T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The...
Tackling Threats at Super Bowl 51
When it comes to the Super Bowl, football and food are the first things that come to mind—not cyberthreats. But...