Featured Blogs
The Rising Trend of OneNote Documents for Malware delivery
Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
How To Spring Clean Your Digital Devices
Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your...
How to Remove Viruses from Your Android Phone
So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to...
How To Stop Sharing Private Information Online
When I started my job as Cybermum – over 10 years ago – it was quite common to strategise ways...
How to Protect Yourself From Phishing Scams
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...
What Parents Need To Know About TikTok’s New Screen Time Limits
Social media platforms often get a hard time by us parents. But a recent announcement by TikTok of industry first...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
What is a Zero-Day Threat?
“Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but. It’s a previously unknown...
What is a Botnet? And What Does It Have to Do with Protecting “Smart Home” Devices?
The pop-up toaster as we know it first hit the shelves in 1926, under the brand name “Toastmaster.” With a...
Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea
Authored by SangRyol Ryu McAfee’s Mobile Research Team discovered a software library we’ve named Goldoson, which collects lists of applications...
How Private is WhatsApp Really? Staying Safer While Using the App.
It’s important to note that the only time your communications are encrypted is when they’re in transit. They’re otherwise plain...
How To Prevent Ransomware
Ransomware. Even the name sounds scary. When you get down to it, ransomware is one of the nastiest attacks a...
Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices...
Extortion Fraud is Still on the Rise
Authored by Lakshya Mathur and Sriram P McAfee Intelligence observed a huge spike in extortion email frauds over the past month....
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
HiddenAds Spread via Android Gaming Apps on Google Play
Authored by Dexter Shin Minecraft is a popular video game that can be played on a desktop or mobile. This...
7 Tips to Protect Your Devices and Private Information from Ransomware
Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly...
How to Limit Location Tracking on Your Phone
We all know that our phones know a lot about us. And they most certainly know a lot about where...
How To Create The Strongest Passwords
Some of the strongest passwords you can use are the ones you don’t have to remember. Strange as that may...
How To Be Safe On WhatsApp
I’m betting you have WhatsApp on your phone. Or, if you don’t – I’m quite sure a member of your...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
New Wave of SHTML Phishing Attacks
Authored By Anuradha McAfee Labs has recently observed a new wave of phishing attacks. In this wave, the attacker has...
How Senior Adults Can Safeguard Their Privacy
Smart speakers. Banking online. Location tracking. If you are a senior adult, there’s no doubt, the digital leaps and bounds...
GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader
Authored by: Anandeshwar Unnikrishnan Stage 1: GULoader Shellcode Deployment In recent GULoader campaigns, we are seeing a rise in NSIS-based...
How to Protect Your Family’s Privacy on Twitter: A Guide for Parents and Kids
It’s no secret that when it comes to social networks, teen preferences can change dramatically from year to year. That...
How to Avoid Phishing Attacks on Your Smartphones and Computers
Ping, it’s a scammer! The sound of an incoming email, text, or direct message has a way of getting your...