Featured Blogs
Focus on Real Friends This Friendship Day
I walked into my niece’s room and found her busy making colourful bands. “What are these for?” I asked. “Friendship...
FOMO: How to Help Digital Kids Overcome the Feeling of Missing Out
What happens when you give hundreds of teenagers smartphones and unlimited access to chat apps and social networks 24/7? A...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
Forgot Where You Were Yesterday? Google Has You Covered.
Last Tuesday, Google introduced Your Timeline for its Google Map website and Android devices. Your Timeline acts as a documentarian...
Fortnite: Why Kids Love It and What Parents Need to Know
Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded...
Four of the coolest jobs in cybersecurity
This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data...
Four Ways To Use AI Responsibly
Are you skeptical about mainstream artificial intelligence? Or are you all in on AI and use it all day, every...
France Gets Hit with Its Largest Data Breach Ever — What You Need to Know
Two massive data breaches in France have impacted roughly half the nation’s population. The data of an estimated 33 million...
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much...
Free Ransomware Available on Dark Web
The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...
Free Wi-Fi in the Big Apple
This blog was written by Bruce Snell. I was in New York City last June and had a morning free...
French Magazine Suffers Web Hack, Firebombing
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...
Frequent Fortnite Player? 4 Tips to Combat the New Attack on User Accounts
Epic Games’ Fortnite has risen in popularity rapidly since its debut, and cybercriminals have leveraged that popularity to enact a handful...
Frequently Asked Questions About Identity Theft
The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
From Election Day to Inauguration: How Cybersecurity Safeguards Democracy
Inauguration Day has come and gone, and the peaceful transfer of power couldn’t have happened without the intricate systems that...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...