Featured Blogs
Boo! The Spookiest Mobile Hacks of 2016
Endless candy, an excuse to dress up as a character from your favorite comic book, and carving pumpkins with family…...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices
From headsets, to speakers – Bluetooth technology has become an integral part our devices, and our everyday lives. Since it...
Blue Whale Challenge: What Parents Need to Know!
Understand the online threat of the 'Blue Whale Challenge' and how it targets kids and teens online. Learn warning signs and tips to keep your kids safe!
Blogging Best Practices and Hot Topics for Security Marketers
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?
What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves. Understanding...
Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...
Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone
It’s the screen you never want to see. Something is seriously wrong with your phone. Or is it? You might...
Black Friday and Holiday Shopping Dangers
This blog was written by Bruce Snell. As a kid, I remember hearing about the horror stories of the insanity...
Black Friday and Cyber Monday Scams: Beware of the Pitfalls
With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.
Bitcoin Security: Mining Threats You Need to Know
Bitcoin security risks are a cryptocurrency reality. Learn more about bitcoin mining safety and how to protect your devices.
Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware...
Bitcoin Headlines Attract Malware Developers
Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the second quarter of...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
Big, Hard-to-Solve Problems
Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually...
Beyond Clubhouse: Vulnerable Agora SDKs Still in Widespread Use
On February 17th, 2021, McAfee disclosed findings based on a 10-month long disclosure process with major video conferencing vendor Agora,...
