Featured Blogs
Could a Streaming Device Help Hackers Hijack Your TV?
Streaming devices make dumb TVs smart and smart TVs, well, smarter. But as loyal “Hackable?” listeners know, the smarter something...
Using Expert Rules in ENS to Prevent Malicious Exploits
Expert Rules are text-based custom rules that can be created in the Exploit Prevention policy in ENS Threat Prevention. Learn more about which threats they can help block.
McAfee Reveals the Most Dangerous Celebrities Across the Globe
Earlier this week, we revealed McAfee’s Most Dangerous Celebrity of 2019 in the U.S., Alexis Bledel. Growing from a young...
How to Remove Viruses from Your Android Phone
One of my favorite binges of late is the Netflix series Halt and Catch Fire. It’s a story about the personal...
Did You Check Your Quarantine?!
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...
A Cybersecurity Horror Story: Stay Secure From October’s Creepiest Threats
Halloween time is among us and ghosts and goblins aren’t the only things lurking in the shadows. This past month...
Office 365 Users Targeted by Voicemail Scam Pages
McAfee Labs has been observing a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials.
3 Tips to Protect Yourself From the Office 365 Phishing Scams
Cybercriminals seem to get more and more sophisticated with their attacks, and phishing scams are no different. The McAfee Labs...
Chapter Preview: Ages 11 to 17 – From Tweens to Teens
For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!”...
What You Need to Know About the Google Chrome Vulnerabilities
While you might have been preoccupied with ghosts and goblins on Halloween night, a different kind of spook began haunting...
Helping Kids Think Critically About Influencers They Follow Online
When I was a teenager, my role model was Olympic gymnast Mary Lou Retton. I admired everything about her. I...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Veterans Day U.S. – A McAfee MoM’s Reflection
By: Deb, Executive Assistant, Plano TX On Monday, November 11, the U.S. celebrates Veterans Day. We at McAfee U.S. are...
Spanish MSSP Targeted by BitPaymer Ransomware
Co-authored by Marc RiveroLopez Initial Discovery This week the news hit that several companies in Spain were hit by a...
Sadfishing, Deepfakes & TikTok: Headlines You May Have Missed
Technology trends move fast and the digital newsfeeds run non-stop. No worries, we’ve got your backs, parents. Here are three...
‘Tis the Season for Cybersecurity: Stay Protected This Holiday Season
It’s beginning to look a lot like the holiday season – and with the holidays comes various opportunities for cyber-scrooges...
Are Smart Padlocks Secure Enough to Protect Your Packages?
“Hackable?” host Geoff Siskind likes to shop online. A lot. What he doesn’t like is how often his packages are...
2.2 Million Users Affected By Latest Data Exposure: 4 Tips to Stay Secure
The digitalization of data allows it to move effortlessly and be accessed from devices and places around the world within...