Featured Blogs
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you may recall, our...
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part IV Aaaaaand, we are back! *drum rolls* This week’s topic is...
America’s Dirty Little Secrets: Opening the Door to Protected Data
It’s 2018. Digital assistants have started taking over our homes, with adoption growing tenfold. These smart speakers know everything about...
Amazon Gift Card Malware Spreading via SMS
McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely...
Almost 5% of Smartphones Lost Every Year
McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones...
Alleged ‘Momo Challenge’ Reminds Parents to Monitor Online Content
Editor’s Note: This blog post includes disturbing content and mentions of suicide. Internet challenges have been going on for years....
All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you...
All Work and No Play? Not at McAfee!
By Srinidhi, Software Quality Engineer There’s more to life than work. It’s a commonly held and often stated view, but companies...
AI in the Wild: Malicious Applications of Mainstream AI Tools
It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host...
AI Enters the Mix as Online Job Scams Continue to Rise
You didn’t get the job. Worse yet, you got scammed. Because the opening was never real in the first place....
AI chatbots are becoming romance scammers—and 1 in 3 people admit they could fall for one
It started with a DM. For five months, 25-year-old computer programmer Maggie K. exchanged daily messages with the man she...
AI & Your Family: The Wows and Potential Risks
From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this ...
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...
Adylkuzz CoinMiner Spreading Like WannaCry
The last few days have been very busy for security teams all around the globe due to the nasty ransomware...
Advances in Our Use of AI Keep You Even Safer Online
AI is on your side. In fact, it’s kept you safer online for some time now. Now that scammers and...
Adult Voice-Service Apps on Google Play Japan Charge Users Without Notice
McAfee has reported on increasing fraudulent Android applications on Google Play in Japan this year, including one-click fraud applications and...
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected
Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking...
Adobe Flash Player Installer Scams Reappear on Google Play
Adobe Flash Player has been a boon to Android malware creators for a long time. These developers have taken advantage...
Additional Analysis into the SUNBURST Backdoor
Executive Summary There has been considerable focus on the recent disclosures associated with SolarWinds, and while existing analysis on the...
Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw...
Active iOS Smishing Campaign Stealing Apple Credentials
McAfee Mobile Research recently found an active phishing campaign targeting iOS users via SMS messages. The message tells users that their Apple...
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial...
Access Denied! New Instagram Hack Kicks Users Out of Their Accounts
Instagram is undoubtedly one of, if not the most popular social media platform among users today. Everyone from celebrities to...
A Year in Review: Threat Landscape for 2020
As we gratefully move forward into the year 2021, we have to recognise that 2020 was as tumultuous in the...
A Traveler’s Guide to International Cybersecurity
Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....
A Snapshot: How to Keep Your Kids Safe on Instagram
“Mom, how do you block people on Instagram? I can’t figure it out,” yelled 13-year old Chloe casually from the...
A Simple Text Puts 95% of Android Devices in the Hotseat
Earlier this week, a new vulnerability was discovered, potentially afflicting up to 950 million Android devices. This accounts for nearly...