Featured Blogs
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
7 Tips to Protect Your Devices and Private Information from Ransomware
Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...
How to Limit Location Tracking on Your Phone
We all know that our phones know a lot about us. And they most certainly know a lot about where...
How To Create The Strongest Passwords
Some of the strongest passwords you can use are the ones you don’t have to remember. Strange as that may...
How To Be Safe On WhatsApp
I’m betting you have WhatsApp on your phone. Or, if you don’t – I’m quite sure a member of your...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
New Wave of SHTML Phishing Attacks
Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...
How Senior Adults Can Safeguard Their Privacy
Smart speakers. Banking online. Location tracking. If you are a senior adult, there’s no doubt, the digital leaps and bounds...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids
It’s no secret that when it comes to social networks, teen preferences can change dramatically from year to year. That...
How to Avoid Phishing Attacks on Your Smartphones and Computers
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
Independent Lab Tests Show that McAfee Stops Malware Dead in Its Tracks
Concerned about ransomware? McAfee stops it dead in its tracks. Newly published findings from the independent labs at AV-TEST show...
Is My Child Being Cyberbullied Or Is It Just Banter?
If you were to ask me what I consider to be the most attractive attribute in a person, it would...
“Where Did I Leave My Phone?” Protecting Your Phone from Loss and Theft
Maybe you know that sinking feeling all too well. “Where did I leave my phone?” The minutes pass as you...
Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam
Three seconds of audio is all it takes. Cybercriminals have taken up newly forged artificial intelligence (AI) voice cloning tools...
Steer Clear of Rip-offs: Top Tips for Safer Online Shopping
Everyone loves a great deal when they shop online. Until they discover it’s a rip-off. Social media ads for vintage...
Instagram Safety for Kids: Protecting Privacy and Avoiding Risks
If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk...
Mobile Spyware—How You Can Keep Stalkers Off Your Phone
When you wind up with mobile spyware, you may wind up with a stalker on your phone. In its most...
Why Are Some Countries Banning TikTok?
Waiting in the checkout line. Waiting to fall asleep. Waiting for your boring work call to finally end. When you...
Make Your Smart Home a Secure Home Too: Securing Your IoT Smart Home Devices
It’s only a smart lightbulb. Why would anyone want to hack that? Great question. Because it gets to the heart...
Three Reasons You Need a VPN
You know what a VPN is, but the question remains—why do you need a VPN? There’s one good reason. Your...
Anyone Can Try ChatGPT for Free—Don’t Fall for Sketchy Apps That Charge You
Anyone can try ChatGPT for free. Yet that hasn’t stopped scammers from trying to cash in on it. A rash...
How to Protect Your Identity Before You Leave on Vacation
Your summer vacation is approaching quickly! You can’t wait to take time away from your responsibilities, jump out of your...