Featured Blogs
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Pay-Per-Install Company Deceptively Floods Market with Unwanted Programs
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware...
First Smartphone: Are You Putting Cyberbullies Under the Tree This Year?
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may...
McAfee Labs 2019 Threats Predictions Report
Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.
The Spotify Phishing Scam: How to Reel in This Cyberthreat
Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is...
Stay Secure and Your Wallet Full with Our Holiday #RT2Win Sweepstakes!
Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time...
8 Ways to Secure Your Family’s Online Holiday Shopping
It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance...
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...
Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes...
What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These...
Don’t Get PWNed by Fake Gaming Currency Sites
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons...
2018 Americas Partner Summit
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled...
Holiday Stress Can Make You More Careless Online
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only...
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Why Traditional Database Security Doesn’t Protect Data
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers...
Be the Child On Children’s Day – Build Better Bonds With Your Kids
November 14th is a day children in India keenly look forward to. Schools and neighbourhoods gear up to make the...
Shop till You’re Hacked? 3 Tips to Stay Secure this Holiday Season
With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...
“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...
Triton Malware Spearheads Latest Attacks on Industrial Systems
Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to ...
At What Age Should Kids Join Social Media?
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...
McAfee Explorers: From Student to Teacher
Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end....
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
Connected or Compromised? How to Stay Secure While Using Push Notifications
You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...