Featured Blogs
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Social Underground: Kids Using Google Docs as New Digital Hangout
Over the years kids have succeeded in staying one step ahead of parents on the digital front. Remember the golden...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a...
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark...
Social Media: How to Steer Your Family Clear of Cryptomining Malware
It’s fun to jump on our favorite social media sites such as Facebook, Instagram, or LinkedIn and know we can...
