Featured Blogs
Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam
Three seconds of audio is all it takes. Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools...
Artificial Intelligence: Friend Or Foe?
This blog was written by Ian Yip. The future of cyber safety and personal development lies in the partnership between...
As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack
Turns out, it’s a lot harder for a website to get blacklisted than one might think. A new study found...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site...
AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...
AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...
Astaroth: Banking Trojan Abusing GitHub for Resilience
by Harshil Patel and Prabudh Chakravorty *EDITOR’S NOTE: Special thank you to the GitHub team for working with us on...
At Home or On-the-Go: Boost Your Internet Safety this Summer
Summer is here, which means more sun and more fun for everyone. It also means more streaming, gaming, and downloading. This seasonal reality reminds...
At McAfee, Protecting Customers Takes Precedence Over Seeking Headlines
One question I often hear is “When will McAfee publish a report on the latest threat?” It seems to be...
