Featured Blogs
Stolen Credit Card Numbers Easy to Buy Online
We have seen an increasing amount of articles published about the “Dark Web,” underground cybercriminal sites that are hosted on...
Stolen with a Click: The Booming Business of PayPal Scams
In today’s digital age, online payment platforms like PayPal have become essential tools for our everyday transactions. Unfortunately, they’ve also...
Stop Discarding Devices Frequently- It’s Risky for Mother Earth And Your Cybersecurity
“Aunty, do you happen to have any waste paper at home? I need them for my Environment Day project,” chirped...
Stop! Could That App Be Spying on Your Family?
The latest headlines sound more like a Jason Bourne movie and less like something that could happen in suburbia. However, spyware...
Stop! Do You Really Want to Send That Photo?
Yes we all use (or at least 96% of us do) our smartphones to take photos. But almost half of...
STOP. Read T&Cs. Then Sign Up on Social Media
“Let’s start at the very beginning, A very good place to start; When you read, you begin with A-B-C, When...
Stopping Malware With a Fake Virtual Machine
As we explained in a previous post, some advanced malware can detect a virtual environment such as a sandbox to...
Strengthening the channel: McAfee adds Guran Green
I’m pleased to introduce you to Guran Green, who recently joined McAfee Federal as Director of Channels. We’re especially excited...
Strike a Pose: Blackshades Malware Spies Through Your Webcam
In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private...
Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to Know
When we think of self-harm, most of us think about rituals such as cutting in which a person may physically...
Study: Fortnite Game Becoming the Preferred Social Network for Kids
According to a study recently released by National Research Group (NRG), the wildly popular video game Fortnite is growing beyond its...
Study: Want an Epic Family Vacation this Year? Unplug!
Everyone talks about it but, c’mon, who really completely unplugs from tech completely on vacation? According to a recent study...
Stuxnet Update
Stuxnet has received a lot of attention since McAfee first blogged about it in July. This post will answer some of...
Styx Exploit Kit Takes Advantage of Vulnerabilities
Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits...
Summer Refresh: Take Time to Relax but Not on Password Security
With summer comes permission to relax a little more, sun a little more, and fun a little more. But, as...
Summer Scam Alerts: Don’t Let Crooks Wreck Your Family Travel Plans
While our click-and-pay digital lifestyle makes accessing travel and entertainment more convenient, for every app or website we loop into...
SUNBURST Malware and SolarWinds Supply Chain Compromise
Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s...
Suntan, Sunglasses, Suitcases… and Devices! Indians Find It Hard to Unplug on Vacations
I was showing a friend around Kolkata when we noted several tourists (very evident because of their attire and photographic...
Super Mario Run Has Cybercriminals Sprinting to Exploit the Hype
Nintendo, one of the most popular gaming companies of the past two decades, has finally released its first game exclusively...
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game
Cybercriminals will always try to cash in on a good thing, and football is no exception. Online scammers are ramping...
Supporting Our Military Veterans at McAfee
By Dawson McPherson, Talent & Communications Coordinator Over the past week, McAfee employees around the world paused to recognize and...
Supporting the Women Most Affected by the Pandemic
Supporting the Women Hit Hardest by the Pandemic Only 57% of women in the U.S. are working or looking for...
Survey: Kids Using Devices in School for More than Just Learning
August marks the start of a new school year and with that comes new concerns for parents of digital kids....
Survey: More Than Half of Travelers Couldn’t Unplug on Vacation
Everybody knows it, everybody admits it, and everybody seems to accept it. We’re addicted to our mobile phones. While over-attachment...
Suspicious Apps on Google Play Leak Google Account IDs
The Google account ID (or account name), which in most cases is a Gmail address, is one of the key...
Suspicious Mobile App Finds Your Gmail, Facebook, and Twitter Accounts
Today many people use multiple web services, such as social networking and messaging services. Some users explicitly show their identity...
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
