Featured Blogs
McAfee Partners With Telefónica To Help Secure Consumers Worldwide
These days, cyberattacks can feel relentless. Due to the interconnected nature of the world we live in, cybercriminals have managed to...
What MWC 2019 Shows Us About the Future of Connectivity
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress...
JAVA-VBS Joint Exercise Delivers RAT
The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an...
Alleged ‘Momo Challenge’ Reminds Parents to Monitor Online Content
Editor’s Note: This blog post includes disturbing content and mentions of suicide. Internet challenges have been going on for years....
McAfee Protects Against Suspicious Email Attachments
Email remains a top vector for attackers. Over the years, defenses have evolved, and policy-based protections have become standard for...
Let’s Discuss Cybersecurity as a Career Option This International Women’s Day
Even as I write this blog, the higher secondary board exams have started in schools across India and I send...
McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day
By Karla, Digital Media Specialist During the month of March, we are thrilled to support International Women’s Day, on March...
Smart home safety tips
Do you live in a “smart” home? If you look around and see interactive speakers, IP cameras, and other internet-connected...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...
809 Million Records Left Exposed: How Users Can Protect Their Data
It’s no secret that technological advancements and online threats are directly proportional to each other. So now more than ever,...
How to Make Sure Spring Break Doesn’t Wreck Your Digital Rep
Spring Break 2019 is in full swing, which means high school and college kids have hit the road determined to...
You Rang? New Voice Phishing Attack Tricks Unsuspecting Users
In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to...
Basic Android Apps Are Charging High Subscription Fees With Deceptive Tactics
Free apps have a lot of appeal for users. They don’t cost a cent and can help users complete tasks...
Ghosts May Not Be Real but Trolls Are – Look Out for Social Media Trolls
The Cambridge Dictionary describes a troll as “an imaginary, either very large or very small creature in traditional Scandinavian stories,...
How Online Scams Drive College Basketball Fans Mad
Sports fans everywhere look forward to mid-March for the NCAA men’s college basketball tournament. However, it’s not just college basketball...
Analysis of a Chrome Zero Day: CVE-2019-5786
1. Introduction On March 1st, Google published an advisory [1] for a use-after-free in the Chrome implementation of the FileReader...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to...
The Ultimate CyberParenting Hack – Managing Your Family’s Cybersafety with your Wi-Fi
Managing your family’s cybersafety can often feel overwhelming. But one thing I have learnt in my 22 years of parenting...