Featured Blogs
Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time
The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...
Getting Down With The Kids – Internet Slang for Dummies!
Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it...
Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school....
Ghost Accounts: How Old, Forgotten Logins Put You at Risk for Identity Theft
Remember that website where you bought a T-shirt in 2013? No? Hackers do. And it’s one way they can steal...
Ghost Tapping: What It Is, How It Works, and How to Stay Safe
Contactless payments make everyday purchases fast and easy. Yet with that convenience comes a risk: ghost tapping. In crowded spaces...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
Gift Card Scams: The Gift That Keeps on Taking
Gift card scams cost consumers millions each year. Learn the common types of gift card fraud, how scammers trick victims, and tips to protect your money.
Gift Your Kids The Know-How To Maintain A Healthy Digital Reputation
The Digital India initiative by the Government of India is aimed at ushering in a digitally empowered society. One of...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Giving Back: McAfee Global Community Service Day
This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Going Lacoocoo over Labubu: How Viral Toy Trends Are Becoming Scams
Scammers are exploiting the massive popularity of Labubu collectible toys through fake websites and social media ads, resulting in consumers...
Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords
It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
McAfee Advanced Threat Research (ATR) recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics. The attack used a PowerShell implant that established a channel to the attacker’s server to gather basic system-level data. What was not determined at that time was what occurred after ...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
Google Code Projects Host Android Malware
[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working...
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
Google Ends Dark Web Report. What That Means and How to Stay Safe
Google has officially discontinued its Dark Web Report, the tool that alerted users when their personal information appeared in dark web breach...
Google Just Made Unlocking Your Phone Easier. But is that Good or Bad?
It’s the last week in June and the sun is shining and the birds are chirping and the dogs are...
Google Play Users Risk a Yellow Card With Android/FoulGoal.A
This blog post was co-written by Irfan Asrar. English soccer fans have enthusiastically enjoyed the team’s current run in the...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
Google’s Project Zero: Good News for Cyber Security
Google has assembled a team of counter-hackers to search, identify and patch zero day vulnerabilities and malware across the Web....
