Featured Blogs
Bitcoin Security: Mining Threats You Need to Know
The value of bitcoin has had its ups and downs since its inception in 2013, but its recent skyrocket in...
Black Friday and Cyber Monday Scams: Beware of the Pitfalls
With the shopping bonanzas of Black Friday and Cyber Monday comes a flurry of deals and offers, some of which are too good to be true. Unfortunately, the latter instances often become scams run by fraudsters seeking to take advantage of the shopping frenzy.
Black Friday and Holiday Shopping Dangers
This blog was written by Bruce Snell. As a kid, I remember hearing about the horror stories of the insanity...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...
Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...
Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?
What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves. Understanding...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Blogging Best Practices and Hot Topics for Security Marketers
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a...
Blue Whale Challenge – What You Need To Know And Do!
Parents are waking up to this new online threat to their kids: ‘The Blue Whale Challenge’ which in extreme steps...
BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices
From headsets, to speakers – Bluetooth technology has become an integral part our devices, and our everyday lives. Since it...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
Boo! The Spookiest Mobile Hacks of 2016
Endless candy, an excuse to dress up as a character from your favorite comic book, and carving pumpkins with family…...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Bradley’s Scam Story: New Dad vs Fake IRS Call
Bradley K. was a brand-new dad, sleep-deprived and juggling life with a newborn, when he received a phone call that...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
Breaches and Bugs: How Secure are Your Family’s Favorite Apps?
Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...