Featured Blogs
You vs. the Internet: 5 Hands-On Ways to Begin Safeguarding Your Family’s Privacy
Data mining. Privacy breaches. Malicious third parties. Do you ever feel like these scary sounding, albeit significant, concerns got left...
Casino’s High-Roller Database Compromised by a Single IoT Thermometer
It’s no secret that IoT devices have caused some issues with security in the past. They’ve been used by cybercriminals...
Despite Decline in Use of Adobe Flash, Vulnerabilities Will Continue to Cause Concern
This post was researched and written by Brook Schoenfield with the assistance of Tim Hux, Abhishek Karnik, Asheer Malhotra, and...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Service Provider [24]7.ai Breached, Leaked Customer Data from Delta Airlines, Sears, Kmart
A huge part of modern-day customer service is the chat functionality, which allows customers to converse easily with representatives of...
Parasitic Coin Mining Creates Wealth, Destroys Systems
The increasing popularity of cryptocurrencies has inspired some people to pursue coin mining, essentially making money online. (Mining is the...
DNS – the Blind Spot in Your Security Ecosystem
It’s 10 a.m. on a Tuesday morning, and the company’s IT hero sits at her desk… “Firewall… check, anti-virus… check,...
Group Chat Etiquette: 10 Tips to Help Your Family Navigate the Digital Chatter
Technology is touching and transforming nearly every area of our lives, especially our relationships. Group chat, for instance, is replacing...
Teen Gaming, Cybersecurity Specialist Training
Many of us parents have a love/hate relationship with teen gaming. While it seems to cast a spell over many...
Is your password up to snuff?
Everything from social media to banking is protected by a password. But what happens when an expert password cracker targets...
MyFitnessPal, Panera Bread, Saks Fifth Avenue: What to Know About the Recent Data Breaches
This blog has been updated as of 4/4. Practically everything has become digitized in 2018. We’ve developed thousands of health...
Seven Android Apps Infected With Adware, Downloaded Over 500,000 Times
The amount we use our apps and the amount of apps we use has shown no signs of slowing. And...
#DeleteFacebook: Do You Really Need To?
Is it time to #deleteFacebook? Facebook’s long line of dramas has many of us rethinking our dependence on Mark Zuckerberg’s...
Today’s Connected Cars Vulnerable to Hacking, Malware
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.
Indians Are Increasingly Realising Nothing Said Online Is Private
The world is becoming increasingly connected- with locks for you home controlled on your smartphone; CCTV cameras in every room...
McAfee Safe Connect, 2 Gold Winners of 2018 Info Security PG’s Global Excellence Awards®
On February 28th, Info Security Products Guide Global Excellence Awards presented their 2018 award winners. We are humbled to have...
McAfee Safe Connect RT2Win Sweepstakes Terms and Conditions
Just a few weeks back, Info Security Products Guide awarded McAfee Safe Connect with two Gold-Level Global Excellence Awards for...
Don’t Get Duped: How to Spot 2018’s Top Tax Scams
It’s the most vulnerable time of the year. Tax time is when cyber criminals pull out their best scams and...
Travel Agency Orbitz Hit with Data Breach, 880,000 Payment Cards Affected
We all love a good getaway, and as we look ahead to spring and summer, most of us are already...
RottenSys Malware Reminds Users to Think Twice Before Buying a Bargain Phone
China is a region that has been targeted with mobile malware for over a decade, as malware authors there are...
What Is Machine Learning?
What do self-driving cars and interactive speakers have in common? Both utilize something called “machine learning.” This is when we...
1,000,000 downloads and growing
With the premiere of Season Two, the hit podcast Hackable? exceeded the 1MM download mark! But the second season is...
AV Test Android Results 2018
2017 marked not only an explosion in mobile malware but also showed dramatic changes in the mobile landscape, setting up...
Ransomware Takes Open-Source Path, Encrypts With GNU Privacy Guard
McAfee Labs has recently observed a new variant of ransomware that relies on the open-source program GNU Privacy Guard (GnuPG)...
7 Digital Safety Tips for Teens Filing Their First Tax Returns
Landing that first part-time job in high school and filing your first tax return is a rite of passage for...
New Vulnerabilities in Smart TVs Could Allow Hackers to Spy on Users
As recent events like CES and MWC have proved, the popularity of connected devices is showing no signs of slowing....
Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in...