Featured Blogs
Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
How Private is WhatsApp Really? Staying Safer While Using the App.
It’s important to note that the only time your communications are encrypted is when they’re in transit. They’re otherwise plain...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...
What is a Zero-Day Threat?
“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but. It’s a previously unknown...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
What Parents Need To Know About TikTok’s New Screen Time Limits
Social media platforms often get a hard time by us parents. But a recent announcement by TikTok of industry first...
How to Protect Yourself From Phishing Scams
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
How To Stop Sharing Private Information Online
When I started my job as Cybermum – over 10 years ago – it was quite common to strategise ways...
How to Remove Viruses from Your Android Phone
So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to...
How To Spring Clean Your Digital Devices
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
Protecting Your Parents from Scams with Our New Family Plans
As people get into their 70s, they stand to lose more to fraud than any other age group—which makes a...
4 Mobile Malware Threats You Can’t Even See
By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population, this connectedness...
McAfee Teammates Share How They #EmbraceEquity This International Women’s Day
International Women’s Day is a time for us to celebrate the achievements and contributions of women at McAfee and around...
Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You
It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have...
