Featured Blogs
Business Email Compromise Hurts Your Organization
As many workers do today, you probably get emails from your boss asking you to perform various tasks. You may...
Burning Man Is Coming: How to Watch out for Ticket Scammers
As the winter months fade and spring begins to creep up, many millennials and Gen Zers set their sights on...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Building Bridges to a More Connected Security Environment
For a long time, the threat intelligence landscape could be likened to an archipelago; a collection of islands. There were...
Bug Alert! All 330 Million Twitter Users Need to Change Their Passwords Immediately
Tweet, tweet! No, that’s not a bird you’re hearing outside your window, that’s Twitter kindly reminding you to change your...
Brushing Scams: What They Are and How to Stay Safe From Unsolicited Packages
It’s an increasingly common surprise: a package shows up at your door with your name and your address…but you never ordered...
Brittany’s Scam Story: Eras Tour Chaos
Brittany C., a dedicated teacher, had been planning a special night for months. After saving up steadily, she landed four...
British Airways Frequent Flyers Report Stolen Air Miles
Frequent flyers, beware. Tens of thousands of accounts may have been compromised due to an automated attack against British Airways,...
Bringing Up the Next Generation of Digital Citizens
Nearly every automobile driver has some understanding of the ‘rules of the road,’ from using your seatbelt to signaling before...
Bringing Security to the Cloud and Beyond
I remember talking about cloud computing years ago as something in the future or as an “experiment,” knowing that one...
Breaking Down the Rapidly Evolving GandCrab Ransomware
Most ransomware strains have the same commonalities – bitter ransom notes, payment demanded in cryptocurrency, and inventive names. A select...
Breaking Down the Brad Pitt Scam: How it Happened and What We Can Learn
Romance scams have surged in sophistication, preying on emotions and exploiting the trust of victims in the digital age. The...
Breaches and Bugs: How Secure are Your Family’s Favorite Apps?
Is your family feeling more vulnerable online lately? If so, you aren’t alone. The recent WhatsApp bug and social media...
Brazilian Banking Malware Hides in SQL Database
Spam is a plague that has given headaches to system administrators and users for years. A lot of spam tries...
BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain
Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google...
Bradley’s Scam Story: New Dad vs Fake IRS Call
Bradley K. was a brand-new dad, sleep-deprived and juggling life with a newborn, when he received a phone call that...
Botnet Control Servers Span the Globe
McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet. With millions of McAfee endpoints...
Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks
Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping...
Boo! The Spookiest Mobile Hacks of 2016
Endless candy, an excuse to dress up as a character from your favorite comic book, and carving pumpkins with family…...
Bogus ‘DeepSeek’ AI Installers Are Infecting Devices with Malware, Research Finds
In a digital landscape hungry for the next big thing in Artificial Intelligence, a new contender called DeepSeek recently burst...
BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices
From headsets, to speakers – Bluetooth technology has become an integral part our devices, and our everyday lives. Since it...
Blue Whale Challenge: What Parents Need to Know!
Understand the online threat of the 'Blue Whale Challenge' and how it targets kids and teens online. Learn warning signs and tips to keep your kids safe!
Blogging Best Practices and Hot Topics for Security Marketers
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a...
Blockchain Transactions Create Risks for Financial Services
This post was written by Raj Samani and Christiaan Beek of McAfee , and Shane D. Shook, PhD. Trust is...
Blockchain Basics: What’s Blockchain Technology and How Might It Change Our Lives?
What’s blockchain technology? The term gets bandied about often enough, but it doesn’t always get the explanation it deserves. Understanding...
Blockchain 101: What Consumers Need to Know About the Technology
From Bitcoin’s boom, to high stakes hacks – cryptocurrency, and how to secure it, has been the talk of the...
Blackhat Gets Hacking Mostly Right, Makes a Few Hacks of Its Own
Director Michael Mann’s cyber-thriller, Blackhat, opened in theaters this weekend, and promised to be the most realistic portrayal of cybersecurity...
