Featured Blogs
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Global Malware Campaign Pilfers Data from Multiple Industries
McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Giving Back: McAfee Global Community Service Day
This past Thursday, McAfee had its 3rd annual Global Community Service Day (GCSD). With McAfee’s workforce turning up to volunteer...
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Gift Your Kids The Know-How To Maintain A Healthy Digital Reputation
The Digital India initiative by the Government of India is aimed at ushering in a digitally empowered society. One of...
Gift Card Scams: The Gift That Keeps on Taking
Gift card scams cost consumers millions each year. Learn the common types of gift card fraud, how scammers trick victims, and tips to protect your money.
Ghouls of the Internet: Protecting Your Family from Scareware and Ransomware
It’s the middle of a workday. While researching a project, a random ad pops up on your computer screen alerting...
Ghosts of Botnets Past, Present, and Future
‘Twas the morning of October 21st, and all through the house many IoT devices were stirring, including a connected mouse....
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
Ghost Tapping: What It Is, How It Works, and How to Stay Safe
Contactless payments make everyday purchases fast and easy. Yet with that convenience comes a risk: ghost tapping. In crowded spaces...
Ghost Accounts: How Old, Forgotten Logins Put You at Risk for Identity Theft
Remember that website where you bought a T-shirt in 2013? No? Hackers do. And it’s one way they can steal...
Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school....
Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time
The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...
Get Your Online Privacy Under Control
Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....
Get Schooled on Security
It’s hard to imagine what college would have been like if I had today’s technology in my arsenal. With spell...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
GandCrab Ransomware Puts the Pinch on Victims
Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3. The GandCrab ransomware first appeared in January...
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
Game Over! Malicious Minecraft Character Skins Infect Over 50,000 Accounts
Video games allow users to become a whole new persona, to experience imaginary worlds, and live out scenarios that are...
Game Golf Exposure Leaves Users in a Sand Trap of Data Concerns
Apps not only provide users with a form of entertainment, but they also help us become more efficient or learn...
Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
From the Ground Up: How the Cars of the Future Will Be Secured
Autonomous systems are doing wonders for us, whether it be in factory manufacturing or recommending where you go to get...
From the Cloud to Drones: Threat Predictions for 2017
2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have...
From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats
Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...
