Featured Blogs
How to Win the Battle Against Deepfakes and Malware
As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked—AI also works on your side. It...
How to Wipe Out a Computer Virus
In this article, you’ll learn some of the signs that you may have a computer virus, and you’ll learn tips...
How Typosquatting Scams Work
Typosquatting is when someone registers a web address that’s a misspelling of a known website — usually a popular one....
How USB Drives Were Recently Used to Hand-Deliver Malware
We all have unsolicited mail show up in our mailbox. Whether as advertisements or coupons, companies hope we view them...
How Using A VPN Could Save Your Summer
As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However,...
How Valuable Is Your Health Care Data?
This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search...
How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security
Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we’ve gone from seeing well-loved, but deceased, cultural...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
How vulnerability disclosure keeps you and your family safe
Surrounded by smart home devices as well as apps which integrate with other services, we are entering an age of...
How We Can All Work Together For a Better Internet
Let’s face it – we would not be the same people we are today if it wasn’t for the internet....
How we’re #InspiringInclusion at McAfee for International Women’s Day 2024
International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
Hunting for Blues – the WSL Plan 9 Protocol BSOD
Windows Subsystem for Linux Plan 9 Protocol Research Overview This is the final blog in the McAfee research series trilogy...
HVACking: Understanding the Delta Between Security and Reality
The McAfee Labs Advanced Threat Research team is committed to uncovering security issues in both software and hardware to help...
Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety
Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an...
HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit
McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler...
I Smell a RAT: Java Botnet Found in the Wild
Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the...
iBanking Mobile Trojan Poses as Facebook Token Generator
Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a....
Identity Protection Service: The Best Solution to a Growing Problem
I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history...
Identity Theft 101: Five Smart Tech Tips for College-Bound Kids
Starting college marks the first of many adulting firsts — first dorm room, first roommate, first no-curfew-on-a-school-night — indeed, there...
iDroid Bot for Sale Taps Into Mobile Wallets
During recent weeks we’ve seen a new botnet kit advertised in several Russian forums. The iDroidbot costs US$1,500 and targets...
IE Scripting Flaw Still a Threat to Unpatched Systems: Analyzing CVE-2018-8653
Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability...
If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
Everyone’s looking to shave their IT budgets, manage fewer vendors and streamline. The plethora of low cost and sometimes free...
If You Give A Hacker Your Email Address…
Your email address, innocuous as it may seem, is often one of the gateways into your digital persona. This article aims to shed light on the potential dangers and impacts of giving away your email address to the wrong people.
Ileana D’Cruz Tops ‘McAfee Most Sensational Celebrity’ List for 2018
We Indians love our movies and actors and voraciously consume all Page 3 gossip tidbits on them. Our love affair...
Importance of Cybersecurity Lessons in Schools
Are you aware that there are more than 460 million internet users in India, and this is expected to grow...