Featured Blogs
Safer Internet Day: Telling What’s Real from What’s Fake Online
On Safer Internet Day, we ask an important question: how can you tell what’s real and what’s fake online? There’s...
How to Beat Robocallers at Their Game
Some scams make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. But you can beat them at their game. Maybe it’s a call about renewing...
How to Spot Fake Art and Deepfakes
Artificial intelligence (AI) is making its way from high-tech labs and Hollywood plots into the hands of the general population....
This Election Season, Be on the Lookout for AI-generated Fake News
It’s that time of year again: election season! You already know what to expect when you flip on the TV....
Was the Fake Joe Biden Robocall Created with AI?
As voters in the recent New Hampshire primary have found, a fake robocall of President Joe Biden has been making...
Protect What Matters on Data Privacy Day
Imagine a “Privacy Facts” label on the apps, devices, and websites you use. Like a digital version of the “Nutrition...
26 Billion Records Released in “The mother of all breaches”
Security researchers have discovered a massive data breach containing more than 26 billion records — a hacker’s trove of records...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
No, Taylor Swift Won’t Send You a Free Dutch Oven — The New AI Cloning Scam
Taylor Swift wants plenty of good things for her fans — but a free Dutch oven isn’t one of them. ...
New Year, New Tech at CES — The Latest Protection for the Latest Tech
New year, new tech. That’s what hits the floor at the CES show each January in Las Vegas. Whether it’s...
How to Stay Safe in the Age of AI
We’ve seen how AI can create — and how it can transform our lives. What gets talked about less is...
6 Cybersecurity Predictions for 2024 – Staying Ahead of the Latest Hacks and Attacks
AI and major elections, deepfakes and the Olympics — they all feature prominently in our cybersecurity predictions for 2024. That’s...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...
How to Protect Yourself from QR Code Scams
Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
How to Raise Responsible Digital Citizens
‘So, what is the ultimate goal of all of our parenting?’ When I asked this question to a group of...
How to Protect Your Kids From Inappropriate Online Content
Inquisitive, curious and fiercely independent. These are the three words that come to mind when I remember my boys as...