Featured Blogs
Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for...
Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee...
Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up
The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares — at least...
Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations
No One is Invisible to Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations In this challenging time, cybercriminals have their eyes on consumers and institutions...
Ransomware and You
This blog post was written by Bruce Snell. This past weekend I was at a local roller rink where my...
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and...
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages we send to...
RagnarLocker Ransomware Threatens to Release Confidential Information
EXECUTIVE SUMMARY The RagnarLocker ransomware first appeared in the wild at the end of December 2019 as part of a...
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker. Where...
Quick, it’s Time to Uninstall QuickTime for Windows!
This blog post was written by Bruce Snell. Last week the United States Computer Emergency Readiness Team (known as US-CERT)...
Quarterly Threat Report: What Do the Numbers Mean to Me?
This blog post was written by Bruce Snell. Every quarter, the team at McAfee Labs releases a threats report detailing...
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Quality Over Quantity: the Counter-Intuitive GenAI Key
It’s been almost two years since OpenAI launched ChatGPT, driving increased mainstream awareness of and access to Generative AI tools....
Quad Messaging App — The New Facebook on Campus
College—it’s not just a time for growing into the responsible individual you most assuredly will become, it’s also a time...
Q&A: What is ‘Path’ and Is It Safe for My Child?
Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...
Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future
By Simon, Software QA Manager Simon is a Software Quality Assurance Manager at the McAfee Aylesbury office. He joined the...
Putting Protection to The Test
Putting Protection to The Test This year has thrown a lot of challenges at us, and our digital lives were...