Featured Blogs
McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted at McAfee’s...
Breaking Down the Rapidly Evolving GandCrab Ransomware
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select...
Together is Power: Why McAfee Partnered With British Telecom Group
Cybersecurity threats are growing in both number and strength day by day, making it almost impossible for any one person...
‘Operation Oceansalt’ Delivers Wave After Wave
In the latest findings from the McAfee Advanced Threat Research team, we examine an adversary that was not content with a single campaign, but launched five distinct waves adapted to their separate targets.
Have You Talked to Your Kids About a Career in Cybersecurity?
Here’s some cool trivia for you: What profession currently has a zero-percent unemployment rate, pays an average of $116,000 a...
The Connection Between IoT and Consumers’ Physical Health
When we think about how technology impacts our daily lives, we don’t really notice it unless it’s a big-picture concept....
Android/TimpDoor Turns Mobile Devices Into Hidden Proxies
The McAfee Mobile Research team recently found an active phishing campaign using text messages (SMS) that tricks users into downloading...
How to Squash the Android/TimpDoor SMiShing Scam
As technology becomes more advanced, so do cybercriminals’ strategies for gaining access to our personal information. And while phishing scams...
“Grand Theft Auto V” Hack: How to Defeat the Online Gaming Bug
Over the past two decades, we’ve seen a huge rise in the popularity of online gaming among both children and...
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
How to Protect Yourself from Tech Support Imposters
Many of us rely on our technology throughout our everyday lives. So, when something goes wrong, we look to tech...
IoT Lockdown: Ways to Secure Your Family’s Digital Home and Lifestyle
If you took an inventory of your digital possessions chances are, most of your life — everything from phones to...
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
Beware: Zombie IoT Botnets
The ghosts and ghouls of October have come and gone, but the dangers lurking behind virtual walls have hardly disappeared....
Hackable? Is Putting Virtual Reality to the Test
From gaming to helping people conquer their fear of spiders and getting quarterbacks ready for Sunday, virtual reality is a...
Connected or Compromised? How to Stay Secure While Using Push Notifications
You’re probably familiar with push notifications – messages sent by app publishers that pop up on your desktop or mobile...
How I Thrive in Technology at McAfee
By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year....
A New Security Age Needs a New Approach to Security
Security evolves to meet the needs of the age. Keys, for example, were created to secure homes and possessions. Encryption,...
McAfee Explorers: From Student to Teacher
Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end....
At What Age Should Kids Join Social Media?
Last week, I waved goodbye to my eldest son as he moved halfway across the world to study for a...
Triton Malware Spearheads Latest Attacks on Industrial Systems
Malware that attacks industrial control systems (ICS), such as the Stuxnet campaign in 2010, is a serious threat. This class of cyber sabotage can spy on, disrupt, or destroy systems that manage large-scale industrial processes. An essential danger in this threat is that it moves from mere digital damage to ...
“League of Legends” YouTube Cheat Links: Nothing to “LOL” About
If you’re an avid gamer, you’ve probably come across a game that just seems impossible to complete. That’s because, thanks...
What Parents Need to Know About Live-Stream Gaming Sites Like Twitch
Clash of Clans, Runescape, Fortnite, League of Legends, Battlefield V, and Dota 2. While these titles may not mean much...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
Shop till You’re Hacked? 3 Tips to Stay Secure this Holiday Season
With just days until Black Friday, the unofficial kick off to the holiday shopping season is quickly approaching. In anticipation...