Featured Blogs
Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes
If there’s one reason why classic James Bond films are so widely enjoyed, it’s because of the unbeatable gadgets. From...
How ransomware attacks will soar with the growth of IoT
This blog post was written by Nick Viney. Last month I wrote about the rise of ransomware, a particularly nasty...
Trillium Exploit Kit Update Offers ‘Security Tips’
McAfee Labs has previously blogged about the Trillium Exploit Kit Version 3.0, which is commonly used to create and distribute malware....
Cybercriminals Crack into 360 Million Old Myspace Accounts
It’s easy to create online accounts, and it’s just as easy to forget them. Remember Myspace? The early social media...
Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript
This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Does Your Teen Recognize the Cruelty of Subtweeting?
“No way! Do you think this tweet is about me?” The abruptly frantic teen held her phone directly up in...
What Everyone Can Learn from The Mark Zuckerberg Hack
When we were children, our role models seemed invincible. Could any five-year-old imagine a Superman who was less than perfect?...
How Safe Is Your Personal Information Online?
How many websites have you shared information with? Do you use the same passwords across all your accounts? Is your...
Experts Discuss the 2016 Verizon DBIR: June #SecChat
Cybersecurity in 2016 has been full of sensational headlines. Ransomware has shut down multiple hospitals, millions of credentials have been...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
Facebook Messenger Flaw Could’ve Allowed Criminals to Intercept Messages
When it comes to day-to-day communications, we are—to put it mildly—married to our messaging applications. Which is why it’s worrying...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
WhatsApp Gold: Why Upgrading Isn’t Always a Golden Idea
Whether it was the cool sneakers everyone had in grade school, or the latest cell phone release, we always want...
Risky Selfie Trend: Snapping and Driving
Just when you thought the dangerous selfie craze was winding down, there’s a whole new trend that poses a risk to drivers....
Celebrating our partners across EMEA
This blog was written by David Small. Last week, our EMEA Channel Partner Summit took place in Mallorca. This year’s...
Keep Your Guard Up: Sports Streaming Sites Yield Hidden Dangers
Just as every dog has its day, so too do sports. The NBA finals, the Playoffs, the Stanley Cup —...
A Family Technology Contract? Should You or Shouldn’t You?
I would never consider myself to be an A+ parent. Maybe a solid B. Perhaps I can blame the large...