Featured Blogs
The Uber Data Breach: What Consumers Need to Know
Ride-sharing apps are one of the most successful innovations of the modern digital age. Practically everyone who has a smart...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
The Trends & Challenges Facing The Internet Of Things
This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace in society today....
The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers
This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...
The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer...
The Top Tax Scams of 2024
While last-minute tax filers stare down the clock, scammers look for easy pickings. Tax scams are in full swing as...
The Top 5 Ways To Protect Your Family From Scams
Scams are big business for cybercriminals. In 2023, Aussies lost a whopping $2.7 billion in scams. Barely a week goes...
The Top 5 Scariest Mobile Threats
Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
The Top 12 Scams Of Christmas To Watch Out For
McAfee Latest 2012 Holiday-Related Online Scams and Security Tips for Consumers The holidays are just around the corner and amid...
The Top 10 Riskiest Online Destinations Revealed
As Americans make their travel plans, scammers lie in wait. We’ve uncovered the top ten “riskiest” destinations for travel scams...
The Top 10 Online Booking Scam Hotspots in the U.S. Revealed
With a record-breaking number of Americans set to travel over the July 4th holiday, most of them by car, scammers...
The Threat Landscape Has Evolved. But McAfee Has Too.
There is no question that the threat landscape has evolved. Gone are the times of network worms and...
The Sweet Sixteen Rule
Your child is turning 16! As a parent in the US, your mind is occupied with planning the big sweet...
The Surprisingly Simple Google Maps Attack That Shut Down a Business
Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to...
The Stealthy Stalker: Remcos RAT
Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....
The SS7 Flaw: What it is, and How Hackers Abuse It
Users don’t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions...
