Featured Blogs
McAfee Protects Against Doppelgänging Technique
This blog was co-written with Brook Schoenfield. That adversaries adopt new techniques is a known fact. However, the speed they...
Keep Your Mum Safe This Mother’s Day!
On my first Mother’s Day 21 years ago, I received a pair of gorgeous fluffy pink slippers. Last year –...
Facebook Messenger Malware FacexWorm Steals Passwords and Mines for Cryptocurrency
Facebook Messenger, a feature included within the popular social media network, has grown to become a widely-used platform for friends...
You, Your Company, and BYOD: A Love Triangle
BYOD, or bring your own device, has become the new normal in the corporate workplace. But with this convenience comes...
Trivia Time: Test Your Family’s Password Safety Knowledge
Passwords have become critical tools for every citizen of the digital world. Passwords stand between your family’s gold mine of...
Bug Alert! All 330 Million Twitter Users Need to Change Their Passwords Immediately
Tweet, tweet! No, that’s not a bird you’re hearing outside your window, that’s Twitter kindly reminding you to change your...
The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes...
World Password Day – Stop Worrying, Start Using A Password Manager
“Open Sesame”! Most of us have grown up hearing these magic words, the secret password, that know would reveal the...
Securing Your Devices from Mobile Malware
As the world has gone mobile, so too have the cybercriminals. With users now spending an average of four hours...
Does Your Family Need a VPN? Here are 3 Reasons it May Be Time
At one time Virtual Private Networks (VPNs) used to be tools exclusive to corporations and techie friends who appeared overly...
Open Sesame: Hotel Rooms at Risk of Serious Room Key Hack
No one is a big fan of intruders, let alone being disturbed while you’re on vacation. This is a potential...
Wrong Number: Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates....
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Security Calling: Celebrate National Telephone Day by Securing Your Mobile Devices
April 25 – otherwise known as National Telephone Day – rolls around once a year to remind us of the...
Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts
Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are...
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
Casino’s High-Roller Database Compromised by a Single IoT Thermometer
It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Parasitic Coin Mining Creates Wealth, Destroys Systems
The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...
DNS – the Blind Spot in Your Security Ecosystem
It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check,...
Group Chat Etiquette: 10 Tips to Help Your Family Navigate the Digital Chatter
Technology is touching and transforming nearly every area of our lives, especially our relationships. Group chat, for instance, is replacing...
Teen Gaming, Cybersecurity Specialist Training
Many of us parents have a love/hate relationship with teen gaming. While it seems to cast a spell over many...
Is your password up to snuff?
Everything from social media to banking is protected by a password. But what happens when an expert password cracker targets...
MyFitnessPal, Panera Bread, Saks Fifth Avenue: What to Know About the Recent Data Breaches
This blog has been updated as of 4/4. Practically everything has become digitized in 2018. We’ve developed thousands of health...