Featured Blogs
Have You Checked Your Teens’ Phone for the Burnbook App?
Every few months a new mobile app surfaces on the social landscape that quickly catches on. And, yes, parent—you need...
Meltdown and Spectre 101: What to Know About the New Exploits
Between the Blueborne vulnerabilities and the High Sierra Mac flaw – we saw some nasty bugs in 2017. Now, 2018...
2018 Texting Slang Update: How to Decode What Your Teen is Saying Online
Every year we update our teen slang and this year we’ve added a handful of terms that may make your...
How to Protect Yourself From a Spear Phishing Scam
As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers...
Chameleon: the Wi-Fi Virus That Hides in Plain Sight & Spreads Like a Cold
Recently, a group of researchers at the University of Liverpool successfully tested a new virus with a terrifying potential. It...
What is Wardriving?
Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost...
Why the New Flinch App is Far From Family Friendly
It’s called Flinch and the idea behind this new app echoes an innocent childhood game: Stare at the other person...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...
15 Tips To Better Password Security
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...
Apps to Stop You (Adults!) from Texting and Driving
She was texting and driving when she hit my kid. No, it wasn’t a careless teenager or a group of...
New Exploit of Sandworm Zero-Day Could Bypass Official Patch
Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Netflix Users: Don’t Get Hooked by This Tricky Phishing Email
If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming...
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...