Featured Blogs
What the Mobile-Born Mean for IoT and Cybersecurity
Since before they knew how to walk, Gen Z – or the mobile-born generation – has had a wealth of...
High-Tech & Hackable: How to Safeguard Your Smart Baby Devices
It’s just about as creepy as it gets: A hacker breaking into a smart device in your baby’s nursery. The...
Insider Threat at Coca-Cola Compromises 8,000 Employees’ Information
Cybercrime is often seen as a battle of good versus evil – a hacker tries to infiltrate a system while...
Women in the McAfee Channel
At McAfee, we work hard to advocate and empower women in what remains a male-dominated industry. Women currently make up...
Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it...
3 Ways to Strengthen Your Family Bond this Summer (Without Ditching Your Devices)
My parents recently went through a health crisis that required me to travel to be with them for several weeks....
New VPNFilter Malware Contains Kill Switch, Infects Over 500,000 Devices
Routers are the driving force behind a lot of our modern-day internet use. They power our Wi-Fi, and therefore our...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
America’s Dirty Little Secrets: Opening the Door to Protected Data
It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...
Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set...
Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has...
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to Know
When we think of self-harm, most of us think about rituals such as cutting in which a person may physically...
Privacy Awareness Week-Are We Responsible for Our Data Breach?
“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App
From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most...
Malware on Google Play Targets North Korean Defectors
Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.
Get Your Online Privacy Under Control
Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
McAfee Protects Against Doppelgänging Technique
This blog was co-written with Brook Schoenfield. That adversaries adopt new techniques is a known fact. However, the speed they...
Keep Your Mum Safe This Mother’s Day!
On my first Mother’s Day 21 years ago, I received a pair of gorgeous fluffy pink slippers. Last year –...
Facebook Messenger Malware FacexWorm Steals Passwords and Mines for Cryptocurrency
Facebook Messenger, a feature included within the popular social media network, has grown to become a widely-used platform for friends...
You, Your Company, and BYOD: A Love Triangle
BYOD, or bring your own device, has become the new normal in the corporate workplace. But with this convenience comes...
Trivia Time: Test Your Family’s Password Safety Knowledge
Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of...
Bug Alert! All 330 Million Twitter Users Need to Change Their Passwords Immediately
Tweet, tweet! No, that’s not a bird you’re hearing outside your window, that’s Twitter kindly reminding you to change your...
The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes...