Featured Blogs
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
At What Age Should Kids Join Social Media?
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
At Home or On-the-Go: Boost Your Internet Safety this Summer
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...
AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack
Turns out, it’s a lot harder for a website to get blacklisted than one might think. A new study found...
Artificial Intelligence: Friend Or Foe?
This blog was written by Ian Yip. The future of cyber safety and personal development lies in the partnership between...
Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam
Three seconds of audio is all it takes. Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools...
Are Your Online Photos Sharing More Than You Think?
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think...
Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those...
Are Your Kids Using Decoy Apps to Hide Photos, Videos?
Wouldn’t it be convenient if the dangers heading toward our kids had neon signs pointing to them? Unfortunately, that’s not the...
Are Your Kids Playing Virtual Hide-n-Seek With You?
We all grew up playing hide-n-seek. Remember how your toddler loved playing hide-and-seek as well? Well, today’s tech savvy kids...
Are Your Kids Part of the TikTok App Craze? Here’s What Parents Need to Know
What phone app has over 150 million active users and more than 14 million uploads every day? You might guess...
Are Your Kids Into These 5 Unwanted Trends On Social Media?
Yesterday I picked up a friend’s child, who was returning from the week long class trip to Mumbai. As I...
Are Your Kids Exposed to the Celeb Sexy Selfie Craze?
Almost weekly I read that yet another young celebrity I once considered a safe role model for my teen is...
Are Your Devices Killing the Romance in Your Relationship?
If you ever feel like your partner’s device is the ‘third person’ in your relationship, then you are not alone....