Featured Blogs
Five Ways the Internet of Things Can Put Your Security at Risk
Sometimes a new technology comes along that’s so promising, so revolutionary, that, over time, future citizens consider the innovation to...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
Five Things I Don’t Like About Cloud Security for Homeowners (and One Thing I Do)…
For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just...
Five Reasons Why True Key Is Our Knight in Shining Armor
Has it ever happened to you that you tried to log into an account only to find that you seem...
First Smartphone: Are You Putting Cyberbullies Under the Tree This Year?
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
Firewalls: Still Your First Line of Defense
The term “firewall” has been used since early computing days to describe a kind of electronic bouncer that keeps threats...
Finsta: What You Need to Know About Your Teen’s Fake Instagram Account
Creating a Finsta (fake Instagram) account on the popular photo platform, Instagram has become the norm for many teens. After...
Financial Losses from Tax Scams Top $1,000 on Average—and Gen Z is a Growing Target
Tax season is already stressful for many Americans, and to make matters worse, it’s also a golden opportunity for scammers....
Filing Taxes? Why Identity Protection Matters More Than Ever This Season
Tax season creates a rare and dangerous overlap: Americans are sharing their most sensitive personal information at the exact moment...
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our...
Father’s Day Shout Out to All Dads – Time to Wear Your Cyberdad Cape
Whenever Father’s Day is near, I find myself thinking about the role of a father in the life of his...
Father’s Day Gift Ideas: Protecting the Tech You Give to Dad
A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Fandango and Credit Karma Mobile Apps Put Users At Risk
A night at the movies previously meant compromising between an edge-of-your-seat thriller and that new Nora Ephron romantic comedy, with...
Family-Friendly Online Safety Tips for Summer Vacations
Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the...
Family Tech: How to Save Your Vanishing Attention Span
Researchers have published a handful of studies in the past few years that examine the impact of technology on the...
Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
It’s mind-blowing to think that when you become a parent, you have just 18 summers with your child before he...
Family Safety: Twitter, Instagram Beef Up Measures to Fight Hate Speech, Bullying
The past few weeks have proven to be wins for family safety with several top social networks announcing changes to...
Family Safety News: 3 Big Stories You May Have Missed
The news that produces a safer Internet for our kids is not always good but it is shaping the digital...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Fake WannaCry ‘Protectors’ Emerge on Google Play
Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...
