Featured Blogs
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
How Private is WhatsApp Really? Staying Safer While Using the App.
It’s important to note that the only time your communications are encrypted is when they’re in transit. They’re otherwise plain...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...
What is a Zero-Day Threat?
“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but. It’s a previously unknown...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
What Parents Need To Know About TikTok’s New Screen Time Limits
Social media platforms often get a hard time by us parents. But a recent announcement by TikTok of industry first...