#Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to...
Process Reimaging: A Cybercrook’s New Disguise for Malware
As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even...
Bargain or Bogus Booking? Learn How to Securely Plan Summer Travel
With summertime just around the corner, families are eagerly looking to book their next getaway. Since vacation is so top-of-mind...
Protect Your Digital Life: Why Strong Passwords Matter
Over the years, our lives have become more and more digital. Think about it: 20 years ago, no one was...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
Don’t Let Thunderclap Flaws Strike Your Device
If you own a Mac or PC, odds are you’ve used your laptop’s Thunderbolt port to connect another device to...
How Online Gamers Can Play It Safe
Online gaming has grown exponentially in recent years, and scammers have taken note. With the industry raking in over $100...
MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware
McAfee’s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application...
Customer Support Scams Are Popping up in Social Media Ads: How to Stay Secure
Many of us rely on customer support websites for navigating new technology. Whether it’s installing a new piece of software or...
Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well....