Featured Blogs
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
The Top Tax Scams of 2024
While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...
The Top 5 Ways To Protect Your Family From Scams
Scams are big business for cybercriminals. In 2023, Aussies lost a whopping $2.7 billion in scams. Barely a week goes...
The Top 5 Scariest Mobile Threats
Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
The Top 12 Scams Of Christmas To Watch Out For
The holidays are just around the corner and amid the hustle and bustle, many of us will fire up our...
The Top 10 Riskiest Online Destinations Revealed
As Americans make their travel plans, scammers lie in wait. We’ve uncovered the top ten “riskiest” destinations for travel scams...
The Top 10 Online Booking Scam Hotspots in the U.S. Revealed
With a record-breaking number of Americans set to travel over the July 4th holiday, most of them by car, scammers...
The Threat Landscape Has Evolved. But McAfee Has Too.
There is no question that the threat landscape has evolved. Gone are the times of network worms and...
The Sweet Sixteen Rule
Your child is turning 16! As a parent in the US, your mind is occupied with planning the big sweet...
The Surprisingly Simple Google Maps Attack That Shut Down a Business
Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to...
The Stealthy Stalker: Remcos RAT
Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....
The SS7 Flaw: What it is, and How Hackers Abuse It
Users don’t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions...
The Spotify Phishing Scam: How to Reel in This Cyberthreat
Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is...
The Smart Home Security Guide
The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...
The Smart Home is Coming. Are We Ready for It?
If there’s one topic that has the security community excited, and hopeful at the same time, it’s the Internet of...
The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at...
The Secret Tumblr Craze and What Parents Need to Know
Your kids have all but vanished from Facebook and their Instagram postings are becoming more and more sporadic. If this...
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
The Search for Celebrity Gossip Could Land Your Phone in Hot Water
They may be glamorous, but celebrities can make things quite ugly when it comes to the safety of your mobile...
The Scam Strikes Back: Exploiting the CrowdStrike Outage
Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...
The Role Partners Play in the Cyberskills Shortage
This blog was written by Richard Steranka. Last week, McAfee launched the Hacking the Skills Shortage Report in partnership with...
The Risks of Public Wi-Fi and How to Close the Security Gap
As I write this blog post, I’m digitally exposed, and I know it. For the past week, I’ve had to...
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
The Rise of the Dark Web Gig Economy
The gig economy has become more prevalent in today’s world with the appeal and necessity of flexible work opportunities. Many...
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
