Featured Blogs
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
“Grand Theft Auto V” Hack: How to Defeat the Online Gaming Bug
Over the past two decades, we’ve seen a huge rise in the popularity of online gaming among both children and...
How to Squash the Android/TimpDoor SMiShing Scam
As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams...
Android/TimpDoor Turns Mobile Devices Into Hidden Proxies
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
Have You Talked to Your Kids About a Career in Cybersecurity?
Here’s some cool trivia for you: What profession currently has a zero-percent unemployment rate, pays an average of $116,000 a...
‘Operation Oceansalt’ Delivers Wave After Wave
In the latest findings from the McAfee Advanced Threat Research team, we examine an adversary that was not content with a single campaign, but launched five distinct waves adapted to their separate targets.
Together is Power: Why McAfee Partnered With British Telecom Group
Cybersecurity threats are growing in both number and strength day by day, making it almost impossible for any one person...
Breaking Down the Rapidly Evolving GandCrab Ransomware
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select...
McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted at McAfee’s...
McAfee Security Innovation Alliance 2018 DevCon Awards
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished SIA Partner Awards. The awards ceremony, hosted at...
The Importance of Security Awareness in Our Connected Lifestyle
Not very long ago, people could be seen walking around waving their mobile phones in the air, looking for a...
Working Together to Ensure Better Cybersecurity
For many, it’s hard to picture a work environment that doesn’t revolve around the use of technology. Digital, cloud-based services...
Smarter Clicks: 5 Tips to Help Your Family Avoid Risky Cyber Search Traps
Searching the internet has become as much a part of daily life as pouring that first cup of coffee each...
The Dangers of Linking Your Apple ID to Financial Accounts
The digital wallets of Chinese citizens are under attack thanks to a few bad apples. A recent string of cyberattacks...
Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
The GandCrab ransomware, which first appeared in January, has been updated rapidly during its short life, with Version 5.0.2 appearing...
How the McAfee Rotation Program is Providing Opportunities
By: Darius, Sales & Marketing Rotation Engineer “The sky is the limit.” It’s a phrase I heard frequently growing up,...
As Search Engines Blacklist Fewer Sites, Users More Vulnerable to Attack
Turns out, it’s a lot harder for a website to get blacklisted than one might think. A new study found...
The VORACLE OpenVPN Attack: What You Need to Know
Many of us know that using a VPN (Virtual Private Network) adds an extra layer of security to our Wi-Fi...
When the Digital Impacts the Physical
Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they...
Stay Smart Online Week 2018
Time for a Cyber Safety Check-Up? Aussies love the internet. And the statistics just confirm it. In 2018, 88% of...
#CyberAware: Teaching Kids to Get Fierce About Protecting Their Identity
It wasn’t Kiley’s fault, but that didn’t change the facts: The lending group denied her college loan due to poor credit,...
Digital Assistants, Cryptocurrency, Mobile Malware: ‘McAfee Labs Threats Report’ Trends
Every three months, our team crafts the McAfee Labs Threats Report. The quarterly report ranges in topic and severity but always...
How to Protect Your Connected Devices from Common Cyberattacks
When it comes to internet security, we all suffer from a condition known as optimism bias. It’s the simple idea...