Featured Blogs
With Release of Windows 10, Questions About BitLocker Arise Again
This post was written by Ted Pan. For those of you who were around during the original release of Microsoft’s...
McAfee Launches ‘Threat Landscape Dashboard’
Every week, we read in the news of another breach or targeted campaign, as more patches are released to protect...
Spora Ransomware Infects ‘Offline’—Without Talking to Control Server
Spora is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
What Is Ransomware and Who Does It Target?
Lockouts—they happen. We forget our keys, we can’t remember our passwords—and sometimes, someone else locks us out. And in the...
Millions of Verizon Customers’ Phone Numbers and Accounts PINs Exposed
When your phone is experiencing an issue, you call support, ask for technical tips, and provide personal information when necessary....
What You Need to Know About the Equifax Data Breach
Equifax, one of the three major credit bureaus in the country, said on Thursday it suffered a major breach in...
Catch Phish If You Can
There are some movies you can watch over and over again. For me, it’s “Catch Me If You Can,” Steven...
‘BadRabbit’ Ransomware Burrows Into Russia, Ukraine
This post was researched and written by Christiaan Beek, Tim Hux, David Marcus, Charles McFarland, Douglas McKee, and Raj Samani. McAfee...
PayPal Users: Here’s What You Need to Know About the New Phishing Scam
It’s the season of giving, which means internet scams are practically everywhere, as cybercriminals are trying to trick eager holiday...
Meltdown and Spectre Aren’t Done Just Yet – New Malware Uses Exploits to Attack Browsers
We kicked off 2018 with two powerful new exploits: Meltdown and Spectre. And since the discovery of Meltdown and Spectre...
Today’s Connected Cars Vulnerable to Hacking, Malware
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Teen Texting Slang (and Emojis) Parents Should Know
What adults call texting, kids call talking. They talk on their phones via chat, social comments, snaps, posts, tweets, and...
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
Here’s How the California Consumer Privacy Act Will Affect You
On May 25, 2018, the European Union implemented a new privacy legislature called the General Data Protection Regulation or GDPR....
Is It Time to Overhaul Your Relationship with Technology?
Editor’s Note: This is part I of a series on Digital Minimalism in 2020. When Steve Jobs introduced the iPhone...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
WhatsApp Users: Secure Your Desktop With These Tips
With over 500 million daily active users, WhatsApp is one of the world’s most popular messaging platforms. In an effort...
Help Kids Steer Clear of Cyberbullies During Summer Break
As we all look forward to the sunshine and freedom of summer, it’s important to remember that not all elements...
Your Smart Coffee Maker is Brewing Up Trouble
A smart coffee maker, like other smart appliances, connects to your home network, offering convenience features such as scheduling brew times, remote start, and customization of your coffee preferences. However, this connectivity also opens the door to potential cybersecurity threats.
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
How Does Jailbreaking Or Rooting Affect My Mobile Device Security?
In today’s interconnected world, our mobile devices serve as essential tools for communication, productivity, and entertainment. However, for some tech-savvy...