Featured Blogs
Why Traditional Database Security Doesn’t Protect Data
If we asked database administrators, security teams, and risk teams about their definition of what database security is, the answers...
Preventing WebCobra Malware From Slithering Onto Your System
Cryptocurrency mining is the way transactions are verified and added to the public ledger, a database of all the transactions...
Holiday Stress Can Make You More Careless Online
Holiday stress. Every year, come November, my resting heart rate starts to rise: the festive season is approaching. Not only...
2018 Americas Partner Summit
The Americas Partner Summit 2018 was held on Tuesday, October 16 at MPOWER Cybersecurity Summit. It was a day filled...
Don’t Get PWNed by Fake Gaming Currency Sites
If you’re a gamer, you know how important virtual currency is. It allows you to purchase new costumes and weapons...
What Your Password Says About You
At the end of last year, a survey revealed that the most popular password was still “123456,” followed by “password.” These...
Has Your Phone Become Your Third Child? Ways to Get Screen Time Anxiety Under Control
You aren’t going to like this post. However, you will, hopefully, find yourself nodding and perhaps, even making some changes...
Is a Laptop’s Password Enough to Keep it Secure?
It could happen to any of us. One minute your laptop is sitting on a coffeehouse table or going through...
8 Ways to Secure Your Family’s Online Holiday Shopping
It’s officially the most wonderful time of the year — no doubt about it. But each year, as our reliance...
Stay Secure and Your Wallet Full with Our Holiday #RT2Win Sweepstakes!
Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time...
The Spotify Phishing Scam: How to Reel in This Cyberthreat
Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is...
McAfee Labs 2019 Threats Predictions Report
Our predictions for 2019 move away from simply providing an assessment on the rise or fall of a particular threat, and instead focus on current rumblings we see in the cybercriminal underground that we expect to grow into trends and subsequently threats in the wild.
First Smartphone: Are You Putting Cyberbullies Under the Tree This Year?
There’s pressure — lots of pressure. And not the typical I-want-a-bike or a doll-that-poops kind of pressure your kids may...
Pay-Per-Install Company Deceptively Floods Market with Unwanted Programs
For the past 18 months, McAfee Labs has been investigating a pay-per-install developer, WakeNet AB, responsible for spreading prevalent adware...
Software Company WakeNet AB Discovered Spreading PUPs to Users
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are...
Are Your Online Photos Sharing More Than You Think?
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think...
Avoid Falling Prey to Online Shopping Bait This Festive Season
For a moment, I thought this crazy friend of mine had finally lost it. She was staring at her laptop...
Attention Red Dead Redemption 2 Players: Dodge This New Download Scam
Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game...