Featured Blogs
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Hacking Summit Names Nations With Cyberwarfare Capabilities
In 2009, I read with great interest a paper published in the Journal of International Security Affairs titled The Art...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
5 Cyber Safety Lifehacks for Families (5 Minutes or Less)
Raising a child to be a digitally discerning adult—while trying to slay our own online dragons—seems to take more hours...
What is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One...
Microsoft Agrees: Home Users Need More than Antivirus Alone
After years of telling users that Microsoft Security Essentials was enough to protect their PCs from security threats, Microsoft has...
Nev & Michelle have a Conversation with the Students of Gertz-Ressler High
In honor of National Cyber Security Awareness Month (NCSAM), McAfee joined up with the National Cyber Security Alliance at Gertz-Ressler...
SnapHack: Hacking for the Greater Good?
Most hacks and attacks introduced on this blog are blatantly malicious, looking to nab your valuable information. However, this may...
Revenge Posts on Social Media Could Land You in Jail
After a bad breakup, a scorned lover may choose to channel their anger through ice cream, a good cry, or...
