Featured Blogs
Delving Deeply Into a Bitcoin Botnet
Bitcoin is a virtual decentralized currency that was created in 2009 by developer Satoshi Nakamoto, who described the currency in...
DEFCON – Connected Car Security
Sometime in the distant past, that thing in your driveway was a car. However, the “connected car is already the...
Deepfakes of Prince William Lure Social Media Users into an Investment Scam
Deepfakes of Prince William and the UK Prime Minister are pushing investment scams on Facebook and Instagram. Uncovered by Fenimore...
Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception
As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning...
Deepfake Defense: Your 8-Step Shield Against Digital Deceit
A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users...
Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’
The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
Deadly Digital Dares: The Blackout Challenge on TikTok
The social network TikTok is chockfull of interesting, fun, laugh-out-loud videos shared by creators worldwide. Kids, as well as parents,...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you...
Data Shows You’ll Encounter A Deepfake Today—Here’s How To Recognize It
The internet is brimming with content designed to entertain, inform—and sometimes deceive. The latest tool in a cybercriminal’s arsenal? Deepfakes....
Data Privacy Day: Respecting Privacy, Safeguarding Data and Enabling Trust
This blog post was written by Bruce Snell. At McAfee, we are happy to be part of Data Privacy Day....
Data Privacy Day
This is a critical time for our personal security as it relates to privacy and personal information. A battle is...
Data Breach Exposes 3 Billion Personal Information Records
News of a major data breach that could affect nearly three billion records comes to light from a somewhat unusual...
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
Darkshell DDOS Botnet Evolves With Variants
Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first...
Darknet Markets Will Outlive AlphaBay and Hansa Takedowns
On June 20, law enforcement took over the Hansa marketplace after investigations that began in 2016. On July 5, police...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
Cybersecurity to become a major employment generator – Are you ready?
Hi There! In November 2014, the United Nations Organization (UNO) declared 15th July as World Youth Skills Day. The purpose...
Cybersecurity Tips for Students Returning to School
Almost every teenager in the United States (approximately 96%) reports using the internet daily. As students prepare to return to...
Cybersecurity Supermom: Take Charge and Become the IT Pro in Your Home
Wouldn’t it be great if we all had our own IT department at home? Think about it. If we had...
Cybersecurity Suffers Due to Human Resources Challenges
The cybersecurity industry is in a state of disrepair. Growing human resource problems put the efforts to secure technology at...
Cybersecurity Awareness Month: Taking Charge of Your Safety Online
When it comes to crime, what do people worry about most? Having their car stolen? A break-in while they’re not...
Cybersecurity Awareness Month: If You Connect It, Protect It
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...
Cybersecurity 101: Top Takeaways from Our Back to School Study
The end of summer is almost here, which means both parents and their kids are starting to gear up for...
Cybercrooks are SMiShing for your Apple Credentials
This blog was written by Bruce Snell. SMiShing is another one of those fantastic terms on the internet that drives...