Featured Blogs
June #SecChat Recap: Findings from the 2016 Verizon DBIR
This year’s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260...
The Decluttering Bug
I have a confession to make – I think I have become addicted to decluttering. Perhaps it is the by-product...
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets
Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a...
Trojanized Pokémon GO Android App Found in the Wild
Pokémon GO is a new mobile game that allows fans to “catch” Pokemons in the real world using augmented reality...
The Facebook Cull and Why You Should Embrace It!
So, how many friends do you have on Facebook? Do you really know them or were they just a passing...
Patch Now: Simple Office ‘Protected View’ Bypass Could Have Big Impact
Protected View is a security feature of Microsoft Office. According to research from MWR Labs, Protected View mode is a strong...
My Favourite Mothering Apps
I honestly don’t know where I would be without my favourite collection of apps. With four kids, too many pets,...
Keeping Your Mobile Device (and Your Personal Life) Safe with IoT
Life is made up of the little things. There are ‘fuzzy feeling’ little things; like when the nice lady in...
Pokémon Go: How Families Can Stay Safe (and Still Catch ‘Em All)
Thanks to the new augmented reality game Pokémon Go, app fans across the globe are enjoying countless hours of fun...
Webcam Blackmail: How Cybercriminals Breathe Life into Laptops
Stories of inanimate objects coming to life are familiar to us. Movies such as Toy Story show the idea’s cultural...
Urgent! Update Your Apple Devices Now
This blog was written by Bruce Snell. A number of serious vulnerabilities have been recently reported impacting OS X, iOS,...
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
McAfee Teams With Industry, Law Enforcement to Thwart ‘Shade’ Ransomware
McAfee, Europol, Kaspersky Lab, and Dutch police have taken down the Shade ransomware botnet and captured encryption keys to unlock...
Improve Your Google Account Privacy
This blog was written by Bruce Snell. I’ve had a number of questions come in lately via email, social media...
Beware Cloned Facebook Profiles
If you have had a Facebook friend request from a friend that you are sure you already have then –...
OurMine is at it Again! How They Broke in to MineCraft Accounts
Gamers are one of the largest communities on the internet. YouTube’s most subscribed channel caters to players, 100 million...
Trojanized Propaganda App Uses Twitter to Infect, Spy on Sympathizers
The Mobile Malware Research Team of McAfee has discovered in recent weeks a number of new threats in the Middle...
#WhyCybersecurity
This blog was written by Bruce Snell. “The sky above the port was the color of television, tuned to a...
Taking Steps to Fight Back Against Ransomware
Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among...
Free Wi-Fi in the Big Apple
This blog was written by Bruce Snell. I was in New York City last June and had a morning free...
Active iOS Smishing Campaign Stealing Apple Credentials
McAfee Mobile Research recently found an active phishing campaign targeting iOS users via SMS messages. The message tells users that their Apple...
Cybersecurity to become a major employment generator – Are you ready?
Hi There! In November 2014, the United Nations Organization (UNO) declared 15th July as World Youth Skills Day. The purpose...
Cybercrooks are SMiShing for your Apple Credentials
This blog was written by Bruce Snell. SMiShing is another one of those fantastic terms on the internet that drives...
Autorooting Malware Gives Hackers the Green Light into Your Device
It wasn’t that long ago when discovering new products, restaurants and everything in between came down to asking our circle...
Parent, Is Your Teen Being Foolish on Twitter?
It’s Twitter — not Tweeter — parents, and your teenager could be using the social network in a reckless way. A...
CompuCom Launches Cloud-Based Managed Service Powered by McAfee
This blog was written by Richard Steranka. Today, from Black Hat 2016 in Las Vegas, CompuCom announced the expansion of...