Featured Blogs
The Optus Data Breach – Steps You Can Take to Protect Yourself
Optus, one of Australia’s largest telecommunications carriers, reported news of a data breach that may have compromised the information of...
The Parent’s Cybersafety Checklist for Back To School
Sometimes I am not sure which is more stressful – Christmas, or getting kids ready for the school year. So...
The Past, Present, and Future of Password Security
In simpler times, passwords broke down physical barriers – they allowed people into secret gatherings, opened safes, the list goes...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and...
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco...
The Price of Cybercrime: Protecting the Business You’ve Built from Hacks and Attacks
Cybercrime has a price. One that more and more business owners find themselves paying. The costs push well into the...
The Privacy Problems with Mobile Messaging Apps
When you chat with someone through a third-party messaging app, be aware that someone may read it—someone other than your...
The Quarterly Threats Report: What Does It Mean for You?
This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week...
The Reddit Data Breach: What Consumers Need to Know
With the tagline, “giving you the best of the internet in one place,” Reddit is a popular website designed for...
The Reviews are In—McAfee+ Earns Top Marks from Review Sites
We created McAfee+ so people can be safe and feel safe online, particularly in a time where there’s so much...
The Rise and Risks of AI Art Apps
Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...
The Rise of Backdoor-FCKQ (CTB-Locker)
By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
The Rise of the Dark Web Gig Economy
The gig economy has become more prevalent in today’s world with the appeal and necessity of flexible work opportunities. Many...
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
The Risks of Public Wi-Fi and How to Close the Security Gap
As I write this blog post, I’m digitally exposed, and I know it. For the past week, I’ve had to...
The Role Partners Play in the Cyberskills Shortage
This blog was written by Richard Steranka. Last week, McAfee launched the Hacking the Skills Shortage Report in partnership with...
The Scam Strikes Back: Exploiting the CrowdStrike Outage
Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...
The Search for Celebrity Gossip Could Land Your Phone in Hot Water
They may be glamorous, but celebrities can make things quite ugly when it comes to the safety of your mobile...
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
The Secret Tumblr Craze and What Parents Need to Know
Your kids have all but vanished from Facebook and their Instagram postings are becoming more and more sporadic. If this...
The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at...
The Smart Home is Coming. Are We Ready for It?
If there’s one topic that has the security community excited, and hopeful at the same time, it’s the Internet of...
The Smart Home Security Guide
The expansion of smart home devices in our households is remarkable, with nearly everything from our lights to our laundry...
The Spotify Phishing Scam: How to Reel in This Cyberthreat
Many music-lovers around the world use Spotify to stream all of their favorite tunes. While the music streaming platform is...
The SS7 Flaw: What it is, and How Hackers Abuse It
Users don’t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions...
