Featured Blogs
How to Protect Your Social Media Passwords from Hacks and Attacks
What does a hacker want with your social media account? Plenty. Hackers hijack social media accounts for several reasons. They’ll...
Invisible Adware: Unveiling Ad Fraud Targeting Android Users
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...
5 Online Gaming Tips to Stay Safe From Cybercriminals
Vanquishing aliens, building virtual amusement parks, mashing buttons in online battles royale. For some, playing video games is a way...
Be on the Lookout for Scam Tech Support Calls
Instead of getting you out of a jam, tech support scams get you into one. And they can get costly....
How to Protect Your LinkedIn Account
If you’re a LinkedIn user, log in now and strengthen your security. Reports indicate that LinkedIn accounts are under attack....
Crypto Scam: SpaceX Tokens for Sale
Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...
A Traveler’s Guide to International Cybersecurity
Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....
On Public Wi-Fi, a VPN is Your Friend
You can almost feel it in the air. Wi-Fi is everywhere. And if you tap into public Wi-Fi, do it...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
Online Job Scams – TikTokers Tell Their Stories, with a Warning
We reported earlier this year, a fresh rash of online job scams continue to rope in plenty of victims. Now,...
Secret Selfies: Can Phones Take Pictures and Videos of You Without Your Knowledge?
It’s a longstanding question: can your phone really take selfies without your knowledge? The answer is yes, but with a...
USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
McAfee’s New Privacy & Identity Guard Launches at Staples Stores
Your privacy means everything. And your identity too. The launch of McAfee Privacy & Identity Guard will protect them both. ...
The Future of Work: How Technology & the WFH Landscape Are Making an Impact
As of the writing of this article, the height of the pandemic seems like a distant but still vivid dream....
ChatGPT’s Impact on Privacy and How to Protect Yourself
How To Manage Your Privacy When Using ChatGPT or Other Generative AI Love it or hate it, generative artificial intelligence...
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...
RUOK Day – How to Get Help Online When You’re Not Feeling OK
I’m such a fan of RUOK? Day. Started in 2009, it’s an Australian non-profit suicide prevention that is all about...
Exploring Winrar Vulnerability (CVE-2023-38831)
Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...