Featured Blogs
15 Tips To Better Password Security
Protect your information by creating a secure password that makes sense to you, but not to others. Most people don’t...
Apps to Stop You (Adults!) from Texting and Driving
She was texting and driving when she hit my kid. No, it wasn’t a careless teenager or a group of...
New Exploit of Sandworm Zero-Day Could Bypass Official Patch
Update of October 25: Some comments posted after we published this report suggest that our proof-of-concept exploit will trigger the...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
So You Think Your Phone Is Hacked—Here’s What to Do
Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Netflix Users: Don’t Get Hooked by This Tricky Phishing Email
If you own a smart TV, or even just a computer, it’s likely you have a Netflix account. The streaming...
Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks —...