Featured Blogs
New Cortana Vulnerability Could Allow Cybercriminals to Bypass Lock Screen On Windows 10
Digital assistants help us look up the weather, play our favorite music, and allow us to quickly access a lot...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
A Field Trip to McAfee’s World of Cyber
By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always...
Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize
In recent years, gaming has grown drastically in popularity – moving from a niche hobby to a mainstream activity for...
Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1
The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already...
Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and...
Father’s Day Shout Out to All Dads – Time to Wear Your Cyberdad Cape
Whenever Father’s Day is near, I find myself thinking about the role of a father in the life of his...
Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses
Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...
Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...
Play The Game – Tips and Tricks for Safe Online Gaming
This blog was written by Jessica Brookes. When I was child, gaming was all joysticks and arcades. Now, it’s all...
Teens, Gaming and Risk
How Are Your Kids Navigating the Dangers? It’s no secret that our generation of digital natives love their gaming. Whether...
How I Wear My #McAfeePride
By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know,...
Heads Up Gamers! Fake Fortnite Android Apps Are Being Spread via YouTube Videos
Does the name “Fortnite” ring any bells? It should, because it’s probably the most popular video game in the world...
Summer Refresh: Take Time to Relax but Not on Password Security
With summer comes permission to relax a little more, sun a little more, and fun a little more. But, as...
McAfee Labs Threats Report Features Innovative Attacks, Crypto Mining, Multisector Attacks
In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of this year.
AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...
AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...
Android Users Hit With Mobile Billing Fraud Due to Sonvpay Malware
Ever hear “Despacito” on the radio? Of course you did! It was the song of 2017 – taking over radios,...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
Are third party apps for you?
“What are third party apps?” asked my mother with a frown. “Wow Gran! You are becoming pretty cyber-savvy!” commented my...
What Parents Need to Know About the Popular App Mappen
Kids love their apps but in their excitement to download the new ones, app safety often falls straight off their...
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s...
Time to Take a Good, Hard Look at Your Cybersecurity Health
What happens when your livelihood is at stake, thanks to someone stealing your identity or draining your account? The real-life...
Popular Social Media App Timehop Hit With Huge Data Breach
The Fourth of July is characterized by barbeques, fireworks, and patriotism – and now cyberattacks! Just this past Independence Day,...
Organizations Leave Backdoors Open to Cheap Remote Desktop Protocol Attacks
While researching underground hacker marketplaces, the McAfee Advanced Threat Research team has discovered that access linked to security and building automation systems of a major international airport could be bought for only US$10.