Featured Blogs
Kicking Off MWC 2019 with Insights on Mobile Security and Growing Partnerships
We’ve touched down in Barcelona for Mobile World Congress 2019 (MWC), which is looking to stretch the limits of mobile...
What’s in the Box?
2018 was another record-setting year in the continuing trend for consumer online shopping. With an increase in technology and efficiency,...
Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019’s Mobile Threat Report
These days, we seem to have a newfound reliance on all things ‘smart.’ We give these devices the keys to...
In 2019 the Threat is “Everywhere Malware”, Not just Mobile Malware
This time last year, we said that 2018 would be the year of mobile malware. Today at MWC, we’re calling...
McAfee Partners With Telefónica To Help Secure Consumers Worldwide
These days, cyberattacks can feel relentless. Due to the interconnected nature of the world we live in, cybercriminals have managed to...
What MWC 2019 Shows Us About the Future of Connectivity
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress...
JAVA-VBS Joint Exercise Delivers RAT
The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an...
Alleged ‘Momo Challenge’ Reminds Parents to Monitor Online Content
Editor’s Note: This blog post includes disturbing content and mentions of suicide. Internet challenges have been going on for years....
McAfee Protects Against Suspicious Email Attachments
Email remains a top vector for attackers. Over the years, defenses have evolved, and policy-based protections have become standard for...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day
By Karla, Digital Media Specialist During the month of March, we are thrilled to support International Women’s Day, on March...
Smart home safety tips
Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
How to Make Sure Spring Break Doesn’t Wreck Your Digital Rep
Spring Break 2019 is in full swing, which means high school and college kids have hit the road determined to...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...
Facebook Users: Here are Proactive Tips to Keep Your Data Safe
Social media has become extremely popular over the years, providing users with an easy way to communicate with their friends...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...