Featured Blogs
KRACK Hack Threatens Wi-Fi Security – What it Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord...
KRACKs Against Wi-Fi Serious But Not End of the World
This blog was written by Brook Schoenfield. On October 12, researcher Mathy Vanhoef announced a set of Wi-Fi attacks that...
KRACKs: Five Observations on WPA Authentication Vulnerability
KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts:...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets,...
Latest Crypto Vulnerability Leaks $320 Million: 3 Tips to Boost Your Crypto Confidence
Cryptocurrency has boomed in the last several years, with beginners and experts alike jumping into the industry. It’s proven now...
Latest SpyEye Botnet Active and Cheaper
On April 16, we found a Pastebin entry selling the latest version of the infamous SpyEye botnet (Version 1.3.48) for...
Latest Texting Slang Every Parent Needs to Know
At least once a year we update our texting chat acronyms (slang) list. This year the app Ask.Fm made that...
Lazarus Cybercrime Group Moves to Mobile Platform
When it comes to describing cyberattacks, the word sophisticated is used a lot. Whether to explain yet another “advanced” campaign...
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a...
Leaning into Change with the McAfee Family
With today’s current climate, many companies are building cultures and infrastructures to support working from home (WFH). Like most transitions,...
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is...
Learn Just What a Hacker Can Do With Remote RAT Access
Remote administration tools, or RATs, lurk in phishing emails and malicious downloads across the internet. Once installed, they give hackers...
Learn to Identify and Avoid Malicious Browser Extensions
Browser extensions have become essential parts of how we browse, bank, work, and shop online. From password managers to ad...
Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink...
