Featured Blogs
Cracking Passwords is as Easy as “123”
One month after announcing a corporate data raid affecting 2.9 million of their users, Adobe has found the extent of...
Crash & Burn: Snapchat Security Flaws Strike Again
Snapchat, the photo-sharing app that lets users send and receive photos that disappear after being viewed, has come under its...
Create Strong Passwords with a Password Generator
Create Strong Passwords with a Password Generator Whether you use the internet for several hours every day or only browse...
Creating a Custom Domain Name with a Google App Engine Application
Google’s App Engine is a Platform as a Service (PaaS) for developers that provides features and frameworks to quickly and...
Credit Lock and Credit Freeze: Which Service Is Best for You? Both!
Are you hoping to buy a house or apply for a car, personal, or business loan at some point? A...
Criminals are Getting Excited for Tax Filing Season
Cybercriminals are plotting to take advantage of tax season, by fraudulently impersonating consumers and scamming Americans. For the citizens...
Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List
Cristiano Ronaldo tops McAfee India’s Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet for...
Critical Office Zero-Day Attacks Detected in the Wild
At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we...
CRN Names SIX McAfee Women to its 2016 Women of the Channel List
This blog was written by Richard Steranka. Last week, CRN named SIX women from McAfee to its prestigious 2016 Women of...
CRN’s Women of the Channel 2021 Recognizes McAfee Leaders
Every year CRN recognizes the women who are leading the channel and their unique strengths, vision, and achievements. This year, CRN recognized five McAfee...
CrowdStrike Outage Provides Opportunities for Scammers
Recently, a significant global outage resulted in thousands of Windows computers being brought offline. The source of the outage was...
Cruel Ghouls: New Digital Scams Target Every Age Group
Cruel Ghouls: New Digital Scams Target Every Age Group There are few situations more personal than a distressed family member...
Crush that Worm before It Creeps into Your Computer
Some years ago, a highly infectious computer worm called W32/Autorun was discovered to be infecting Windows computers. Unlike a virus,...
Crypto Scam: SpaceX Tokens for Sale
Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...
Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency
By Oliver Devane Update: In the past 24 hours (from time of publication) McAfee has identified 15 more scam sites...
Cryptocurrencies a Target for Cybercriminals, Part 1: the Risks of Innovation
All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it...
Cryptocurrencies a Target for Cybercriminals, Part 2: Social Platforms Come Next
One target of cybercriminals is cryptocurrencies, which hold tremendous wealth but are largely anonymous. This limits the attack surface mostly...
Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement
A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are...
