Featured Blogs
Breaches and Bugs: How Secure are Your Family’s Favorite Apps?
Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...
Breaking Down the Brad Pitt Scam: How it Happened and What We Can Learn
Romance scams have surged in sophistication, preying on emotions and exploiting the trust of victims in the digital age. The...
Breaking Down the Rapidly Evolving GandCrab Ransomware
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select...
Bringing Security to the Cloud and Beyond
I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one...
Bringing Up the Next Generation of Digital Citizens
Nearly every automobile driver has some understanding of the ‘rules of the road,’ from using your seatbelt to signaling before...
British Airways Frequent Flyers Report Stolen Air Miles
Frequent flyers, beware. Tens of thousands of accounts may have been compromised due to an automated attack against British Airways,...
Brittany’s Scam Story: Eras Tour Chaos
Brittany C., a dedicated teacher, had been planning a special night for months. After saving up steadily, she landed four...
Bug Alert! All 330 Million Twitter Users Need to Change Their Passwords Immediately
Tweet, tweet! No, that’s not a bird you’re hearing outside your window, that’s Twitter kindly reminding you to change your...
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Burning Man Is Coming: How to Watch out for Ticket Scammers
As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Buying Tickets for Beyoncé’s Cowboy Carter Tour? Don’t Let Scammers Ruin Your Experience
Beyoncé has officially announced her Cowboy Carter world tour, and the excitement is through the roof! With her last tour...
BYOD: Balancing Convenience and Security
It lies next to you as you sleep, comes with you to work, rides home with you in your car...
Bypassing Microsoft’s Patch for the Sandworm Zero Day
This is the second part of our analysis of the Sandworm OLE zero-day vulnerability and the MS14-060 patch bypass. Check out...
Bypassing Microsoft’s Patch for the Sandworm Zero Day, the Root Cause
On October 21, we warned the public that a new exploitation method could bypass Microsoft’s official patch (MS14-060, KB3000869) for...
Bypassing Your Passcode: How One Online Hack Can Unleash Your Photos and Texts
You keep some of your most personal information on your phone. Special photos, hundreds of contacts, important emails, private...
CactusTorch Fileless Threat Abuses .NET to Infect Victims
McAfee Labs has noticed a significant shift by some actors toward using trusted Windows executables, rather than external malware, to...