Featured Blogs
Be Wary of WhatsApp Messages Offering 1000GB of Free Data
Global messaging giant WhatsApp turned 10 years old this year. It’s not unusual for companies to provide loyal customers or...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
Capital One Data Breach: How Impacted Users Can Stay More Secure
Capital One is one of the 10 largest banks based on U.S. deposits. As with many big-name brands, cybercriminals see...
Jet Database Engine Flaw May Lead to Exploitation: Analyzing CVE-2018-8423
In September 2018, the Zero Day Initiative published a proof of concept for a vulnerability in Microsoft’s Jet Database Engine....
What Is Mshta, How Can It Be Used and How to Protect Against It
The not-so Usual Suspects There is a growing trend for attackers to more heavily utilize tools that already exist on...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
Examining the Link Between TLD Prices and Abuse
This blog was written by Charlie Feng. Briefing Over the years, McAfee researchers have observed that certain new top-level Domains...
No More Ransom Blows Out Three Birthday Candles Today
Collaborative Initiative Celebrates Helping More Than 200,000 Victims and Preventing More Than 100 million USD From Falling into Criminal Hands...
4 Ways for Parents to Handle the Facebook Messenger Bug
9 out of 10 children in the U.S. between the ages of six and twelve have access to smart devices....
McAfee for McAfee: An Intern Journey
By Gwendolyn McAfee My grandfather always told me that I could achieve anything the world has to offer if I...
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Educational institutions are data-rich gold mines. From student and employee records to sensitive financial information, schools contain a plethora of...
Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
You have likely heard that blockchain will disrupt everything from banking to retail to identity management and more. You may...
YOLO: What Parents Need to Know About the Anonymity App Kids Use with Snapchat
If your kids use Snapchat, chances are they also use the popular new app YOLO along with it. Since it’s...
Downloaded FaceApp? Here’s How Your Privacy Is Now Affected
If you’ve been on social media recently, you’ve probably seen some people in your feed posting images of themselves looking...
McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder
Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an...
Could a Dropped USB Drive Expose You to Malware?
USB drives seem harmless enough and they’re a convenient way to store, back up, or transfer files from your computer....
Family Safety: Twitter, Instagram Beef Up Measures to Fight Hate Speech, Bullying
The past few weeks have proven to be wins for family safety with several top social networks announcing changes to...
Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware
With over 2.5 billion monthly active users that have accumulated since its fruition, Android has seen massive growth over the...
Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy
It’s 2019 and technology is becoming more sophisticated and prevalent than ever. With more technology comes greater connectivity. In fact,...
16Shop Now Targets Amazon
Since early November 2018 McAfee Labs have observed a phishing kit, dubbed 16Shop, being used by malicious actors to target...
Watch Your Webcam: Tips to Protect Your Mac From Zoom Hackers
You’ve probably heard of the popular video conferencing platform, Zoom. This platform enables its millions of users in various locations...
How to Help Kids Build Strong Digital Habits Before Summer Slips Away
Few seasons are more important to the parent-child bond than summer. The days are longer, fewer activities are crowding the...
Evolved IoT Linux Worm Targets Users’ Devices
Since the early ‘90s, Linux has been a cornerstone of computer operating systems. Today, Linux is everywhere — from smartphones...
Summer Scam Alerts: Don’t Let Crooks Wreck Your Family Travel Plans
While our click-and-pay digital lifestyle makes accessing travel and entertainment more convenient, for every app or website we loop into...
Is Your Smart Home Secure? 5 Tips to Help You Connect Confidently
With so many smart home devices being used today, it’s no surprise that users would want a tool to help...
Can Video Game “Mods” Expose Players to Malware?
“Hackable?” host Geoff Siskind’s son is a huge fan of the world-building computer game Minecraft — and downloads “mods” for...
#Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to...