Featured Blogs
Did You Check Your Quarantine?!
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...
How to Remove Viruses from Your Android Phone
One of my favorite binges of late is the Netflix series Halt and Catch Fire. It’s a story about the personal...
McAfee Reveals the Most Dangerous Celebrities Across the Globe
Earlier this week, we revealed McAfee’s Most Dangerous Celebrity of 2019 in the U.S., Alexis Bledel. Growing from a young...
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.
Could a Streaming Device Help Hackers Hijack Your TV?
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But as loyal “Hackable?” listeners know, the smarter something...
How Googling Our Favourite Celebrities Is A Risky Business
Did you know that searching for your favourite celebrities online may very well increase your chance of running into trouble?...
“Gilmore Girls” Actress Alexis Bledel Is McAfee’s Most Dangerous Celebrity
You probably know Alexis Bledel from her role as the innocent book worm Rory Gilmore in network television’s “Gilmore Girls”...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Crescendo
Episode 4: Crescendo This is the final installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi and its...
Want Your Kids to Care More About Online Safety? Try These 7 Tips
The topics parents need to discuss with kids today can be tough compared to even a few years ago. The...
Hack-ception: Benign Hacker Rescues 26M Stolen Credit Card Records
There’s something ironic about cybercriminals getting “hacked back.” BriansClub, one of the largest underground stores for buying stolen credit card...
Chapter Preview: Ages 2 to 10 – The Formative Years
As our children venture into toddlerhood, they start to test us a bit. They tug at the tethers we create...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – Follow The Money
Episode 3: Follow the Money This is the third installment of the McAfee Advanced Threat Research (ATR) analysis of Sodinokibi...
15 Easy, Effective Ways to Start Winning Back Your Online Privacy
Someone recently asked me what I wanted for Christmas this year, and I had to think about it for a...
Watch Your Step: Insights on the TOMS Shoes Mailing Hack
You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...
Hackable?” Tests Whether Car Key Fobs Are Secure
Smart key fobs make it easy to open your car, pop the trunk, and start driving without fumbling around for...
Stay Smart Online Week 2019
Let’s Reverse the Threat of Identity Theft!! Our online identities are critical. In fact, you could argue that they are...
Device & App Safety Guide for Families
While we talk about online safety each week on this blog, October is National Cybersecurity Awareness Month (NCSAM), a time...
Is Your Browser Haunted With Ghostcat Malware?
October is finally among us, and things are spookier than usual. One ghost causing some hocus pocus across the World...
Chapter Preview: Birth to Age 2 – First Footprints
When your baby is on the way, their privacy and digital security is probably the last thing you have on...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – The All-Stars
Episode 2: The All-Stars Analyzing Affiliate Structures in Ransomware-as-a-Service Campaigns This is the second installment of the McAfee Advanced Threat...
McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us
Episode 1: What the Code Tells Us McAfee’s Advanced Threat Research team (ATR) observed a new ransomware family in the...
McAfee Receives the 2019 Security Excellence Award From IoT Evolution
If you’re like most users, you’ve probably adopted several smart devices into your home over the last few years. Whether...
5 Digitally-Rich Terms to Define, Discuss with Your Kids
Over the years, I’ve been the star of a number of sub-stellar parenting moments. More than once, I found myself...
Attention YouTubers: Protect Your Account From Being Hacked
Did you know that YouTube has 23 million content creators worldwide? Well, it turns out that many of these video...
“Hackable?” Puts Wireless Mice to the Test
Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried...
5 Hidden Hashtag Risks Every Parent Needs Know
Adding hashtags to a social post has become second nature. In fact, it’s so common, few of us stop to...
Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open
Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images, as...