Featured Blogs
Want Your Kids to Care More About Online Safety? Try These 7 Tips
The topics parents need to discuss with kids today can be tough compared to even a few years ago. The...
Warning: Crypto-Currency Mining is Targeting Your Android
Cryptocurrency, a virtual form of currency designed to work as a secure form of exchange, has gained a lot of...
Warning: Lokibot Is Looking to Access Your Android
This time of year is always busy for me. Between pre-holiday online shopping, and the push to connect with friends...
Was the Fake Joe Biden Robocall Created with AI?
As voters in the recent New Hampshire primary have found, a fake robocall of President Joe Biden has been making...
Watch Out For IRS Scams and Avoid Identity Theft
Tax season isn’t just busy for taxpayers—it’s prime time for scammers, too. As you gather your W-2s, 1099s, and other...
Watch Out for These 3 World Cup Scams
What color jersey will you be sporting this November and December? The World Cup is on its way to television...
Watch Your Step: Insights on the TOMS Shoes Mailing Hack
You’re familiar with the cybercriminals that go after users’ credit card information and look to spread malicious links, but recently,...
Watch Your Webcam: Tips to Protect Your Mac From Zoom Hackers
You’ve probably heard of the popular video conferencing platform, Zoom. This platform enables its millions of users in various locations...
We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors
The convenience that many IOT devices provide often persuades consumers away from thinking about possible security concerns. McAfee Advanced Threat Research recently investigated Chamberlain’s MyQ Hub, a “Universal” garage door automation platform.
Weak Passwords Can Cost You Everything
The importance of having strong, unique passwords cannot be overstated. However, most individuals tend to use weak passwords or reuse the same password over and over, exposing their digital assets to potential hackers.
Weaponized Medical Data as Damaging as Clinton’s Emails or Trump’s Videos
The 2016 presidential election in the United States will be remembered for a great many things. Never before in US...
Web Searches Get Complicated! Avril Lavigne Tops the 2017 Most Dangerous Celebrities List
To see how cybercriminals take advantage of consumers’ obsession with pop culture, we conducted the 11th annual McAfee Most Dangerous Celebrities study, which reveals which celebrities generate the most “dangerous” search results, and create the biggest risk for users browsing the web.
Webcam Blackmail: How Cybercriminals Breathe Life into Laptops
Stories of inanimate objects coming to life are familiar to us. Movies such as Toy Story show the idea’s cultural...
WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
McAfee Labs researchers have discovered new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.
Wedding Planning App Users Hacked Before the Big Day
Say you’re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to...
Welcome McAfee Forward—the Future of Online Protection Today
With digital life-changing so rapidly, it’s time for a new way to protect it. Welcome to McAfee Forward—the future of...
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had been compromised and...
What About a Heart-To-Heart Talk with Your Loved Ones This Valentine’s Day?
I was listening to the Valentine’s Day playlist of my friend when suddenly espied one of my favorites- Ain’t No...
What are Pig Butchering Scams and How Do They Work?
“Jessica” cost him one million dollars. In an account to Forbes, one man described how he met “Jessica” online.i Readily,...
What Are Ransomware Attacks? An In-Depth Guide
Ransomware is a malicious type of malware that cybercriminals use to encrypt the target’s files or lock their computer systems,...
What Are Serverless Apps?
The smartphone market has exploded in recent years, leading to the development of over 4 million mobile apps. For mobile...
What Are Tailgating Attacks and How to Protect Yourself From Them
Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you...
What Are the 6 Types of Identity Theft
You crack open your credit card statement and something seems … off. Maybe it’s a couple of small online purchases...
What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five...
What Are the Risks of Clicking on Malicious Links?
A simple click of a link can’t cause any trouble, right? Wrong. It doesn’t matter if you quickly close out...
What Are the Risks of Geo-Location?
Using your mobile’s built-in global positioning system (GPS) functionality allows location-based services (or geo-location) to locate and publish information about...
What CES Can Show Us About Evolving Consumer Security Needs: A Timeline
Appropriately dubbed the ‘Global Stage for Innovation,’ it’s no wonder CES showcases the most cutting-edge consumer technologies coming out in...