Featured Blogs
Are Your Online Photos Sharing More Than You Think?
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think...
Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam
Three seconds of audio is all it takes. Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools...
Artificial Intelligence: Friend Or Foe?
This blog was written by Ian Yip. The future of cyber safety and personal development lies in the partnership between...
As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack
Turns out, it’s a lot harder for a website to get blacklisted than one might think. A new study found...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...
AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...
At Home or On-the-Go: Boost Your Internet Safety this Summer
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
At What Age Should Kids Join Social Media?
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Attackers Seek to Hack Hardware for Ultimate Control
We are seeing interesting changes in how researchers and attackers are exploring methods to undermine systems and devices. Increasingly, the...
Attacks On Indian Organizations Continue – More Exploits Focused On Events
In November last year, McAfee Labs researchers reported about Operation Mangal, an ongoing targeted attack campaign against several Indian domestic...
Attacks on SWIFT Banking System Benefit From Insider Knowledge
In recent months, we’ve seen headlines about the compromise of a bank in Bangladesh from which cybercriminals attempted to steal...
Attention Android Users: Is CallerSpy Malware Spying on You?
Meet CallerSpy malware, a new form of mobile malware designed to snoop on calls, texts, and other smartphone communications. This...
Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users
Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to...
Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come...
Attention Fortnite Fans: The New Android App Was Found Containing a Massive Vulnerability
Back in June, Fortnite fans, hopeful for an Android version of the game, were teased with fake apps, which were...