Featured Blogs
Google Just Made Unlocking Your Phone Easier. But is that Good or Bad?
It’s the last week in June and the sun is shining and the birds are chirping and the dogs are...
Google Ends Dark Web Report. What That Means and How to Stay Safe
Google has officially discontinued its Dark Web Report, the tool that alerted users when their personal information appeared in dark web breach...
Google Docs Phishing Campaign is Frighteningly Accurate
Gmail users beware: a very convincing, very deceitful, phishing scam has been making its way around the Internet. The scam...
Google Code Projects Host Android Malware
[March 1: See update at end] Google Code is a well-known platform that provides a collaborative environment for developers working...
Google Brings Safe Browsing to the Masses With Its Safe Browsing API
The best way to protect yourself from the malicious programs (often called malware) hidden across the Internet, is to have...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems
McAfee Advanced Threat Research (ATR) recently released a report describing a fileless attack targeting organizations involved with the Pyeongchang Olympics. The attack used a PowerShell implant that established a channel to the attacker’s server to gather basic system-level data. What was not determined at that time was what occurred after ...
Going The Extra Mile: Pandora, Facebook, and Netflix Ask Users to Reset Passwords
It’s a good sign when businesses take the initiative to protect consumers’ online safety. Not only does it allow customers...
Going Lacoocoo over Labubu: How Viral Toy Trends Are Becoming Scams
Scammers are exploiting the massive popularity of Labubu collectible toys through fake websites and social media ads, resulting in consumers...
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Giving Back: McAfee Global Community Service Day
This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Gift Your Kids The Know-How To Maintain A Healthy Digital Reputation
The Digital India initiative by the Government of India is aimed at ushering in a digitally empowered society. One of...
Gift Card Scams: The Gift That Keeps on Taking
Gift card scams cost consumers millions each year. Learn the common types of gift card fraud, how scammers trick victims, and tips to protect your money.
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Ghost Tapping: What It Is, How It Works, and How to Stay Safe
Contactless payments make everyday purchases fast and easy. Yet with that convenience comes a risk: ghost tapping. In crowded spaces...
Ghost Accounts: How Old, Forgotten Logins Put You at Risk for Identity Theft
Remember that website where you bought a T-shirt in 2013? No? Hackers do. And it’s one way they can steal...
Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school....
Getting Down With The Kids – Internet Slang for Dummies!
Whenever my boys come home with a new buzz word or saying, I instantly feel like a dinosaur. Whether it...
Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time
The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...
Get Your Online Privacy Under Control
Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....
Get Schooled on Security
It’s hard to imagine what college would have been like if I had today’s technology in my arsenal. With spell...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
