Featured Blogs
Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it...
3 Ways to Strengthen Your Family Bond this Summer (Without Ditching Your Devices)
My parents recently went through a health crisis that required me to travel to be with them for several weeks....
New VPNFilter Malware Contains Kill Switch, Infects Over 500,000 Devices
Routers are the driving force behind a lot of our modern-day internet use. They power our Wi-Fi, and therefore our...
VPNFilter Botnet Targets Networking Devices
VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.
America’s Dirty Little Secrets: Opening the Door to Protected Data
It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...
Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set...
Why You Need To Know About “Cryptojacking”
As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has...
It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was...
Vega Stealer Malware Swoops Financial Data Straight from Chrome and Firefox Browsers
Many internet users today store financial and personal data within a browser so that it auto-populates anytime they encounter a...
Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization...
Study: Digital Self-Harm Among Teens Real; Here’s What Parents Need to Know
When we think of self-harm, most of us think about rituals such as cutting in which a person may physically...
Privacy Awareness Week-Are We Responsible for Our Data Breach?
“The best match for me,” announced my daughter one Sunday morning sometime back, “is a Scorpio.” “Oh really? And this...
Sensitive Data on 3 Million Facebook Users Potentially Exposed by Suspended App
From Facebook to Twitter and now back to Facebook – the past few months have seen some of the most...
Malware on Google Play Targets North Korean Defectors
Earlier this year, McAfee researchers predicted in the McAfee Mobile Threat Report that we expect the number of targeted attacks on mobile devices to increase due to their ubiquitous growth combined with the sophisticated tactics used by malware authors.
Get Your Online Privacy Under Control
Online privacy: too often managing this aspect of our digital lives gets shuffled to the bottom of our ‘to-do’ lists....
Syn/Ack Unique Proactive Protection Technique
McAfee’s Advanced Threat Research team has performed analysis on samples of Syn/Ack ransomware implementing Process Doppelgänging. For those who are...
McAfee Protects Against Doppelgänging Technique
This blog was co-written with Brook Schoenfield. That adversaries adopt new techniques is a known fact. However, the speed they...
Keep Your Mum Safe This Mother’s Day!
On my first Mother’s Day 21 years ago, I received a pair of gorgeous fluffy pink slippers. Last year –...