Featured Blogs
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
“WannaCry” Ransomware Spreads Like Wildfire, Attacks Over 150 Countries
Update: The McAfee team has developed a tool that can be used in an effort to recover files that have been...
More Details on "Operation Aurora"
Earlier today, George Kurtz posted an entry, ‘Operation “Aurora” Hit Google, Others’,  on the McAfee’s Security Insight blog The purpose...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
The Latest Mobile Scams & How To Stay Safe
If the challenges of working from home, connecting with family, and keeping on top of the news have you grabbing your phone more than ever, you’re not...
How to Reset Your Gmail Password After Being Hacked
If you think your Gmail account’s been hacked, you’ll want to act. And act quickly. The fact is that your...
Bypassing Microsoft’s Patch for the Sandworm Zero Day
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out...
New VPNFilter Malware Contains Kill Switch, Infects Over 500,000 Devices
Routers are the driving force behind a lot of our modern-day internet use. They power our Wi-Fi, and therefore our...
Does Kik Messenger Pose a Danger to Your Kids?
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular...