Consumer Threat Notices

Massive Security Flaw for High Sierra Macs Emerges

When it comes to cybersecurity, we’ve seen our fair share of device flaws. Sometimes, hackers leverage these vulnerabilities to execute complicated attacks that compromise your data. And sometimes, there are flaws that hardly require cybercriminals to lift a finger. Just yesterday, a massive flaw emerged that embodies the latter. This ...

Consumer Threat Notices

Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low. Here’s Why

A lot of people love to play poker for the thrill and entertainment of sheer luck. For some, however, it’s more of a game of skill. One where you can discern the intent of your competitors by reading their faces and tics and betting on whether they have the cards ...

McAfee Labs

Macro Malware Targets Macs

Macro malware has been spreading for years. New techniques arise all the time to hide malicious code and thus increase the difficulty of analysis. However, just targeting Microsoft Windows no longer seems to be enough for the malware authors. The Mac appears to be the new challenge, and attackers appear ...

Mobile and IoT Security

iOS Users Aren’t So Immune to Threats After All

  10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been released. While we relaxed in velour tracksuits and shred on Rock Band’s faux guitar, we were also obsessing over the release of what was about to be the biggest game ...

Consumer Threat Notices

Why You’re Going to Have to Start Filtering Your Calendar Invitations

Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured “amazing savings” and discounts on a variety of popular products. They were, of course, spam messages — akin to those you’d find in an email inbox. But this “calendar spam” is different than the ...

Mobile and IoT Security

So You Think Your Phone Is Hacked—Here’s What to Do

Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep our sensitive data under wraps. Now imagine if a stranger had free access to, and total control of, your mobile device. All of your personal information, including contacts, emails, payment ...

Family Safety Identity Protection Mobile and IoT Security

How Do I Live Safe?

This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter.  We thought it would be a great way to share some tips from the McAfee family about what we, as security professionals, do to stay safe online.  Instead of flooding Twitter with my contributions ...

Mobile and IoT Security

Mobile Shopping on Social Media: The New Frontier

Let’s go back in time. Here’s the scenario: You’re hosting a party and the party prep includes a trip to the grocery store, the craft store, and the mall for the perfect dress. That’s three separate stops and several hours logged for party prep, before it even begins. Fast forward ...

Consumer Threat Notices

Phony Adobe Flash Update Hosts Malware, Targets Apple Users

Computer maintenance is often a simple equation: avoid behavior that might land you a virus, and keep your software up-to-date. Thanks to security update pop-up reminders, the latter is usually an easy step. However, while these alerts may be helpful to you as a user, not all of them are ...

Consumer Threat Notices

XcodeGhost Pulled from App Store After a Good Scare: What to Know

This week in cybersecurity was yet another for the books, as we watched a tech giant swiftly avert a security crisis. In a nutshell: a group of hackers found a way to access hundreds of iOS apps in Apple’s App Store in China, and potentially compromise user information. A wide ...

Subscribe to McAfee Securing Tomorrow Blogs