Featured Blogs
Seeking Reconnection: Internet Usage and the Return to Travel
Even as the internet kept us connected with family and friends during the pandemic, people remain understandably eager to reconnect in person as vaccines roll...
How to Remain Secure While Using Running Apps
When gyms were forced to close last year, you likely looked for other ways to get some exercise and stay active during quarantine....
Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for...
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
The Roaming Mantis smishing campaign has been impersonating a logistics company to steal SMS messages and contact lists from Asian...
How to Stop the Popups
McAfee is tracking an increase in the use of deceptive popups that mislead some users into taking action, while annoying...
World Password Day: Make Passwords the Strongest Link in Your Online Security
World Password Day isn’t the most popular day on the calendar, but it’s an important reminder that good password hygiene...
Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...
PC Gamers (and Parents of Gamers) Rejoice!
Of all the pastimes that took off during the pandemic, it’s not surprising that online gaming was one of them....
The Mothers of Invention: Women Who Blazed the Trail in Technology
It’s easy to imagine where we would be without women in technology. We’d be poorer for it. With Mother’s Day upon...
What Is Adware? A Definitive Guide
We live in a digital world and a lot of our daily activities are online, including banking, grocery shopping, and...
Beware of BRATA: How to Avoid Android Malware Attack
Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Digital Divorce: Who Gets the Airline Miles and Music Files?
Something you’ll want to know about all those movies, mp3s, eBooks, air miles, and hotel points you’ve accrued over the years: they’re digital assets that can factor...
Clever Billing Fraud Applications on Google Play: Etinu
Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...
McAfee VP Shares His Four Pledges for a Healthier Lifestyle
After experiencing a health scare that changed his life, VP of Technology Services, Paul, vowed to make incremental changes by...
McAfee Awarded “Cybersecurity Excellence Awards”
In a year where people relied on their digital lives more than ever before and a dramatic uptick in attacks quickly followed, McAfee’s protection stood strong. We’re proud to...
Why Coin Miners Go Bad & How to Protect Your Tech When They Do
Cryptocurrency enthusiasts are flocking to the Wild West of Bitcoin and Monero to cash in on the recent gold rush. Bitcoin’s meteoric rise in value is...
McAfee Labs Report Reveals Latest COVID-19 Threats and Malware Surges
The McAfee Advanced Threat Research team today published the McAfee Labs Threats Report: April 2021. In this edition, we present...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
What Is a Trojan?
You may vaguely remember reading Virgil’s epic poem “Aeneid” back when you were in school. The story of Odysseus and...
What Is a Password Manager?
Many of us rely on passwords to secure our digital devices and online accounts, from our personal computers and mobile...
How to Quickly Remove Malware From an iPhone
For the most part, iPhones are well-protected devices — but they aren’t immune to malware attacks. These attacks range from...
McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware
Executive Summary Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact...
McAfee Defender’s Blog: Cuba Ransomware Campaign
Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations...
Prioritizing Security in a Remote Learning Environment
Prioritizing Security in a Remote Learning Environment Learning environments are not what they used to be, and as educational institutions...
Is the Clubhouse App a Safe Place for Kids to Hangout?
Is the Clubhouse App a Safe Place for Kids to Hangout? Most of us have fond summer memories of hanging...
McAfee Defenders Blog: Reality Check for your Defenses
Welcome to reality Ever since I started working in IT Security more than 10 years ago, I wondered, what helps...