Featured Blogs
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Bradley’s Scam Story: New Dad vs Fake IRS Call
Bradley K. was a brand-new dad, sleep-deprived and juggling life with a newborn, when he received a phone call that...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
Breaches and Bugs: How Secure are Your Family’s Favorite Apps?
Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...
Breaking Down the Brad Pitt Scam: How it Happened and What We Can Learn
Romance scams have surged in sophistication, preying on emotions and exploiting the trust of victims in the digital age. The...
Breaking Down the Rapidly Evolving GandCrab Ransomware
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select...
Bringing Security to the Cloud and Beyond
I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one...
