Featured Blogs
Protect Your Social Media Accounts from Hacks and Attacks
Here’s to the hashtags, the likes, the followers, the DMs, and the LOLs—June 30th marks Social Media Day, a time to celebrate...
Protect Yourself Against Phishing Scams With These Security Tips
Phishing is one of the oldest cyberthreats in the book, and yet still one of the most effective. As people across the globe...
Protect yourself from scams this Diwali
It’s Diwali, a time of light, a time of togetherness, and, of course, a time of celebration. Along with Diwali...
Protecting the Universal Remote Control of Your Life—Your Smartphone
Aside from using it for calls and texting, we use our smartphones for plenty of things. We’re sending money with...
Protecting Your Parents from Scams with Our New Family Plans
As people get into their 70s, they stand to lose more to fraud than any other age group—which makes a...
Protecting Your Personal Identity During Holidays
December is finally upon us, which means the holidays are coming. While we’ll all be thinking about others during this...
Protecting Your Privacy on Social Media
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But, the kind of...
Protecting Your Privacy This Year
If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our...
Protecting Yourself in the Wake of the Robinhood Data Breach
The Robinhood trading platform recently disclosed a data breach that exposed the information of millions of its customers. News of the attack was released on Monday, November 8th along with word the...
Putting Protection to The Test
Putting Protection to The Test This year has thrown a lot of challenges at us, and our digital lives were...
Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future
By Simon, Software QA Manager Simon is a Software Quality Assurance Manager at the McAfee Aylesbury office. He joined the...
Q&A: What is ‘Path’ and Is It Safe for My Child?
Q: I overheard my son telling his friend to message him on Path. What is Path and should I be...
Quad Messaging App — The New Facebook on Campus
College—it’s not just a time for growing into the responsible individual you most assuredly will become, it’s also a time...
Quality Over Quantity: the Counter-Intuitive GenAI Key
It’s been almost two years since OpenAI launched ChatGPT, driving increased mainstream awareness of and access to Generative AI tools....
Quarian Group Targets Victims With Spearphishing Attacks
This blog post was written by Rahul Mohandas. The current generation of targeted attacks are getting more sophisticated and evasive....
Quarterly Threat Report: What Do the Numbers Mean to Me?
This blog post was written by Bruce Snell. Every quarter, the team at McAfee Labs releases a threats report detailing...
Quick, it’s Time to Uninstall QuickTime for Windows!
This blog post was written by Bruce Snell. Last week the United States Computer Emergency Readiness Team (known as US-CERT)...
Quizzes and Other Identity Theft Schemes to Avoid on Social Media
Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker. Where...
RagnarLocker Ransomware Threatens to Release Confidential Information
EXECUTIVE SUMMARY The RagnarLocker ransomware first appeared in the wild at the end of December 2019 as part of a...
Raising Kids in a Digital World: Top Takeaways from Our 2017 Connected Family Survey
Today’s world is certainly a digital one. Everything, from the stores where we shop to the messages we send to...
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021
Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and...
Ransomware and You
This blog post was written by Bruce Snell. This past weekend I was at a local roller rink where my...
Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations
No One is Invisible to Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations In this challenging time, cybercriminals have their eyes on consumers and institutions...
Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up
The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares — at least...
Ransomware Could Be the New Data Breach: 5 Tips to Stay Secure
Cybercriminals tend to keep with the times, as they often leverage current events as a way to harvest user data or spread malicious content. McAfee...
Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for...