Featured Blogs
Can Hackers Make Drones Drop out of the Sky?
While Amazon hasn’t begun using autonomous drones to deliver packages (yet), the aerial technology is becoming more and more popular....
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...
McAfee Labs Threats Report Examines Cybercriminal Underground, IoT Malware, Other Threats
The McAfee Advanced Threat Research team today published the McAfee® Labs Threats Report, December 2018. In this edition, we highlight...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
Fake Apps & Banking Trojans Are Cybercriminal Favorites
Today, we are all pretty reliant on our mobile technology. From texting, to voice messaging, to mobile banking, we have...
How to Get Technology Working for You This Christmas
Harnessing the power of the internet and technology this Christmas may just be what you need to get over this...
Cybercriminals Disguised as Apple Are After Users’ Personal Data
With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends...
Rogue Drones Cause Gatwick Airport to Close for Over 30 Hours: More on This Threat
As the Internet of Things works its way into almost every facet of our daily lives, it becomes more important...
The #1 Gift Parents Can Give Their Kids This Christmas
You won’t see this gift making the morning shows as being among the top hot gifts of 2018. It won’t make your...
What Parents Need to Know About Virtual & Augmented Reality
You’ve probably heard the buzz around Virtual Reality (VR) and Augmented Reality (AR) and your child may have even...
Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind...
Do Your Kids Love Gaming? Know How to Protect Them from A Cyberattack
Fortnite, Call of Duty Black Ops 4, Red Redemption 2, Spiderman, and Assassin’s Creed: Odyssey. If you are the parent...
Kicking off CES 2019 with New Security Solutions and Collaborations
Today, we at McAfee are announcing some exciting new security solutions and integrations at CES in Las Vegas. For those...
How to Protect Three Common IoT Devices in 2019
It’s no secret – IoT devices are creeping into every facet of our daily lives. In fact, Gartner estimates there will...
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed, they give hackers...
Cash Out with Our CES 2019 #RT2Win Sweepstakes!
We’ve officially touched down in Las Vegas for CES 2019! If you aren’t familiar with CES, it is the global...
Verizon Teams Up with McAfee to Secure Today’s Connected Home
Few fields and industries change as rapidly as those in the technology sector. This fast-moving, adaptable and growing sector creates...
Meet McAfee WebAdvisor’s New Cryptojacking Blocker
totalBy now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply,...
Ryuk Ransomware Attack: Rush to Attribution Misses the Point
Senior analyst Ryan Sherstobitoff contributed to this report. During the past week, an outbreak of Ryuk ransomware that impeded newspaper...
2019 is Here – Have You Made Any Digital Parenting Resolutions for The Year?
Hello parents! Welcome to 2019. I have a hunch you are feeling all charged up and ready to start the...
IE Scripting Flaw Still a Threat to Unpatched Systems: Analyzing CVE-2018-8653
Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability...
That’s a Wrap! Read the Top Technology Takeaways From CES 2019
The sun has finally set on The International Consumer Electronics Show (CES) in Las Vegas. Every year, practically everyone in...
Cryptojacking Up 4,000% How You Can Block the Bad Guys
Think about it: In the course of your everyday activities — like grocery shopping or riding public transportation — the...
STOP. Read T&Cs. Then Sign Up on Social Media
“Let’s start at the very beginning, A very good place to start; When you read, you begin with A-B-C, When...
Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well....