Featured Blogs
Gmail Users: App Developers Can Potentially Read Your Private Emails
Email has been the norm for decades now, as most digitally connected people use it to communicate in both their...
Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events
Every four years, everyone’s head around the globe turns toward the television. The Olympics, the World Cup – world events like...
What Parents Need to Know About the Popular App Mappen
Kids love their apps but in their excitement to download the new ones, app safety often falls straight off their...
Are third party apps for you?
“What are third party apps?” asked my mother with a frown. “Wow Gran! You are becoming pretty cyber-savvy!” commented my...
The Exactis Data Breach: What Consumers Need to Know
There are data breaches, and then there are data breaches. For example, who could forget the Equifax data breach, which...
Android Users Hit With Mobile Billing Fraud Due to Sonvpay Malware
Ever hear “Despacito” on the radio? Of course you did! It was the song of 2017 – taking over radios,...
AsiaHitGroup Returns With New Billing-Fraud Campaign
Are you tired yet of the music track “Despacito”? If you downloaded this ringtone app from Google Play, chances are...
AsiaHitGroup Gang Again Sneaks Billing-Fraud Apps Onto Google Play
The McAfee Mobile Research team has found a new billing-fraud campaign of at least 15 apps published in 2018 on...
McAfee Labs Threats Report Features Innovative Attacks, Crypto Mining, Multisector Attacks
In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of this year.
Summer Refresh: Take Time to Relax but Not on Password Security
With summer comes permission to relax a little more, sun a little more, and fun a little more. But, as...
Heads Up Gamers! Fake Fortnite Android Apps Are Being Spread via YouTube Videos
Does the name “Fortnite” ring any bells? It should, because it’s probably the most popular video game in the world...
How I Wear My #McAfeePride
By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know,...
Teens, Gaming and Risk
How Are Your Kids Navigating the Dangers? It’s no secret that our generation of digital natives love their gaming. Whether...
Play The Game – Tips and Tricks for Safe Online Gaming
This blog was written by Jessica Brookes. When I was child, gaming was all joysticks and arcades. Now, it’s all...
Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...
Apply MITRE’s ‘ATT&CK’ Model to Check Your Defenses
Every week we read about adversaries attacking their targets as part of online criminal campaigns. Information gathering, strategic advantage, and...
Father’s Day Shout Out to All Dads – Time to Wear Your Cyberdad Cape
Whenever Father’s Day is near, I find myself thinking about the role of a father in the life of his...
Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and...