Featured Blogs
Petya is Here, And It’s Taking Cues from WannaCry
Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s...
How to Protect Your Child from Identity Theft in 8 Easy Steps
With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor...
The Power of Partnering: McAfee and Cisco Interoperability Delivers Strong Email Security
Highlights In cooperation through the McAfee Security Innovation Alliance and Cisco Solution Partner Program, McAfee® Advanced Threat Detection and Cisco...
Will Your Smart Home Be Your Next House Sitter?
As I rush to catch a flight, I’ll often think in a panic, “Do I have my keys? Passport? Plane...
The #1 Skill All Parents Should Be Homeschooling Kids in This Summer
Dear Mr. and Mrs. Smith, your child’s decision to post inappropriate content online is why we’ve decided to rescind our...
Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages...
McAfee Discovers Pinkslipbot Exploiting Infected Machines as Control Servers
This blog was written by Sanchit Karve. McAfee Labs has discovered that banking malware Pinkslipbot (also known as QakBot/QBot) has...
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her Instagram page. However,...
We’ve Mastered Encrypted Messaging, So Are Encrypted Calls Next?
We’ve all heard the names before – WhatsApp, Viber, Telegram, Wire, Signal, Allo… with so many cyberattacks in the news...
Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation....
