Featured Blogs
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed, they give hackers...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
Less Is More: Why One Antivirus Software Is All You Need
Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect...
Lessons Learned: A Decade of Digital Parenting
Give yourself a high-five, parents. Pour yourself a cup of coffee or your favorite celebratory drink and sip it slow...
Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day...
Let’s Commit To Protect Our Privacy This Year
Let’s Commit To Protect Our Privacy This Year How our new identity & privacy app can help By this point...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
Level Up Your Cybersecurity: Insights from Our Gaming Survey
Online gaming has seen a rise in popularity over the years. Many people see it as a way to unwind...
LG Smart TVs Leak Data Without Permission
Deals abound on gadgets and gizmos in the wintry weeks before Christmas, but could that shiny new toy on your...
Life Behind the Screens of Parents, Tweens, and Teens: McAfee’s Connected Family Study
How do parents and children connect and protect themselves online? We spoke with thousands of them around the world to...
Light a Lamp This Diwali To Dispel the Darkness of Digital Literacy
One of my favourite Indian festivals is Diwali and I have a sneaky feeling I may have mentioned this a...
Lights, Camera, Cybersecurity: What You Need to Know About the MoviePass Breach
If you’re a frequent moviegoer, there’s a chance you may have used or are still using movie ticket subscription service...
Like This Post – And Get Hacked
Admit it. Social media has made your world a little smaller—and it’s all in the palm of your hands. Our...
LilyJade Version 2.0: a Malicious Browser Extension
In order to gain popularity and usability, web browsers offer extra features. Chief among these are browser plug-ins, which can...
Linux Kernel Vulnerability Can Lead to Privilege Escalation: Analyzing CVE-2017-1000112
This blog was written by Krishs Patil. A memory corruption bug in UDP fragmentation offload (UFO) code inside the Linux...
Little Ones Online More? Here Are 10 Basics To Keep Them Safe
Online safety conversations look dramatically different depending on the age and stage of your child. For very young children, toddlers...
Live Streaming – The Good, The Bad & The Ugly
Listen up parents: live streaming is the latest trend that you need to get your heads around. Not only are...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Location Apps: Who’s Tracking Your Kids?
Last week we talked about the dangers that can arise with apps that allow anonymous users to interact. Equally concerning...
Location, Location, Location: Three Reasons It Matters for Your Smartphone
With its built-in location services, your smartphone can point you to plenty of places. To the location of your vacation...
Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago,...
LockerGoga Ransomware Family Used in Targeted Attacks
Co-authored by Marc RiveroLopez. Initial discovery Once again, we have seen a significant new ransomware family in the news. LockerGoga,...
Locky Ransomware Hides Inside Packed .DLL
McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively...
Locky Ransomware Hides Under Multiple Obfuscated Layers of JavaScript
This post was prepared with the invaluable assistance of Rahamathulla Hussain and Girish Kulkarni. During the last couple of weeks,...
Locky Ransomware on Rampage With JavaScript Downloader
Locky is a ransomware family that encrypts victims’ files and demands money to decrypt the files. It has infected many...
Look Before You Leap: Imposter DeepSeek Software Seek Gullible Users
Authored by Aayush Tyagi and M, Mohanasundaram *Bold = Term Defined in Appendix In this blog, we discuss how malware...
Looking Ahead to 2021: The Things We’ll Carry Forward
Looking Ahead to 2021: The Things We’ll Carry Forward Right now, I’m thinking about how my life changed in 2020....