Mobile Security

Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese Consulate Staff

Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates....

Internet Security Privacy & Identity Protection

Why Social Engineering is a Scammer’s Secret Weapon

Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind...

McAfee Enterprise

Social engineering attacks you might see in the IoT

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we...

McAfee Enterprise Executive Perspectives

Social Engineering in the Internet of Things (IoT)

Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly...

Internet Security Mobile Security

Hacking Humans: How Cybercriminals Trick Their Victims

McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the...

Internet Security Privacy & Identity Protection

Hacking the Human OS: A Report on Social Engineering

Why are data breaches so commonplace?  Whether the attacks are against the energy sector as reported July 2014[i] with over...

Internet Security Mobile Security

Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses

Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on...

Internet Security Security News

The Surprisingly Simple Google Maps Attack That Shut Down a Business

Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to...

Subscribe to McAfee Securing Tomorrow Blogs