Featured Blogs
Live Streaming – The Good, The Bad & The Ugly
Listen up parents: live streaming is the latest trend that you need to get your heads around. Not only are...
Little Ones Online More? Here Are 10 Basics To Keep Them Safe
Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers...
Linux Kernel Vulnerability Can Lead to Privilege Escalation: Analyzing CVE-2017-1000112
This blog was written by Krishs Patil. A memory corruption bug in UDP fragmentation offload (UFO) code inside the Linux...
Like This Post – And Get Hacked
Admit it. Social media has made your world a little smaller—and it’s all in the palm of your hands. Our...
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study
How do parents and children connect and protect themselves online? We spoke with thousands of them around the world to...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...
Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
Let’s Commit To Protect Our Privacy This Year
Let’s Commit To Protect Our Privacy This Year How our new identity & privacy app can help By this point...
Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day...
Lessons Learned: A Decade of Digital Parenting
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow...
Less Is More: Why One Antivirus Software Is All You Need
Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Learn to Identify and Avoid Malicious Browser Extensions
Browser extensions have become essential parts of how we browse, bank, work, and shop online. From password managers to ad...
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed, they give hackers...
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is...
Leaning into Change with the McAfee Family
With today’s current climate, many companies are building cultures and infrastructures to support working from home (WFH). Like most transitions,...
LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a...
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.
Lazarus Cybercrime Group Moves to Mobile Platform
When it comes to describing cyberattacks, the word sophisticated is used a lot. Whether to explain yet another “advanced” campaign...
Latest Texting Slang Every Parent Needs to Know
At least once a year we update our texting chat acronyms (slang) list. This year the app Ask.Fm made that...
Latest SpyEye Botnet Active and Cheaper
On April 16, we found a Pastebin entry selling the latest version of the infamous SpyEye botnet (Version 1.3.48) for...
Latest Crypto Vulnerability Leaks $320 Million: 3 Tips to Boost Your Crypto Confidence
Cryptocurrency has boomed in the last several years, with beginners and experts alike jumping into the industry. It’s proven now...
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets,...
