Featured Blogs
Trojanized Propaganda App Uses Twitter to Infect, Spy on Sympathizers
The Mobile Malware Research Team of McAfee has discovered in recent weeks a number of new threats in the Middle...
Trouble Enforcing Family Tech Rules? Stay on Track with the 4 Cs
Setting and enforcing rules — especially online safety ones — can feel close to impossible at times. But there are...
True or Fake News? Know How You Can Separate Truth from Fiction Online
In the good old days, it was very easy to separate truth from fiction. Literature was clearly marked and newspapers...
True Security Requires a Holistic Approach
In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One...
Trust and Relationships in the Mobile Era
Love is in the air…and, unfortunately, so is betrayal, as people get ready to share their hearts and more via...
Trust Is the Most Valuable Asset
The most valuable asset for actors in cyberspace is trust. It is an important ingredient in successful business operations as...
Trust Under Fire: How to Help Your Kids Understand Trust in a Digital World
Just about everything comes down to trust, especially in a hyper-connected, share-happy digital culture. We pay strangers to Uber us,...
Turkish ‘Delete Virus’ Targets Facebook Users
Facebook continues to be a favorite target for attackers to spread fake wall-post messages or fake scams. Most of the...
Turkish Instagram Password Stealers Found on Google Play
McAfee’s mobile malware research team has found several Instagram password stealers on the Google Play store. (Google has since removed...
Twitter Accounts of US Media Under Attack by Large Campaign
A previously reported campaign purportedly carried out by Turkish hacker group “Ayyildiz Tim” targeting high-profile, verified Twitter accounts with the purpose of spreading Turkish political propaganda appears to have escalated within the last 24 hours. McAfee Advanced Threat Research has investigated the new events and discovered the following.
Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach...
Two Attacks On Mobile Banking Are Back
It feels as through every day, a new app is released that makes it easier to pay for something through...
Two Pink Lines
Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a...
Two-Factor vs. Multi-Factor Authentication: What’s the Difference?
This article breaks down the forms of authentication, explaining how they work and how they can enhance online information security.
Types of Online Banking Scams and How to Avoid Them
Online banking puts the ability to pay bills, check your balance, or transfer money at your fingertips. Unfortunately, it can...
Typosquatting Attacks Alive and Well–Unfortunately
Typosquatting doesn’t get the attention that it used to, but it remains an effective means for attackers to capitalize on unsuspecting...
U.S. Battleground County Website Security Survey
Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote
U.S. Election 2020 – Don’t Let COVID-19 Misinformation Suppress Your Vote In the early days of the COVID-19 pandemic, another...
Uber Data Breach and How to Protect Your Info
The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that...
Understanding Online Trolls and How to Deal with Them
Imagine, if you will, a person who goes online each day with the sole mission of triggering confrontation, provoking conflict,...
Understanding the Risks of Using an Android Device
Android has, over time, become a popular target for hackers. Recently, McAfee Labs™ found that all new forms of malicious mobile software were solely designed to exploit vulnerabilities in the Android operating system.
Understanding Your Kid’s Smart Gadgets
When people think about IoT devices, many often think of those that fill their homes. Smart lights, ovens, TVs, etc....
Unfolding the Mystery of Cerber Ransomware’s Random File Extension
This blog post was written by Sudhanshu Dubey. In an earlier blog, we discussed the evolution of the popular Cerber...
Unintended Clipboard Paste Function in Windows 10 Leads to Information Leak in RS1
The McAfee Labs Advanced Threat Research team has been investigating the Windows 10 platform. We have submitted several vulnerabilities already...
Unmasking AI and the Future of Us: Five Takeaways from the Oprah TV Special
In a recent special hosted by Oprah Winfrey titled “AI and the Future of Us”, some of the biggest names...
Unmasking AsyncRAT New Infection Chain
Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...
Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation....