Featured Blogs
Spyware distributed through Amazon Appstore
Authored by Wenfeng Yu and ZePeng Chen As smartphones have become an integral part of our daily lives, malicious apps...
A New Android Banking Trojan Masquerades as Utility and Banking Apps in India
Authored by Dexter Shin Over the years, cyber threats targeting Android devices have become more sophisticated and persistent. Recently, McAfee...
This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers
McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into...
The Stealthy Stalker: Remcos RAT
Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....
How to Protect Your Data While On-the-Go
Winter travel is filled with excitement—whether you’re heading to a snow-covered ski resort, visiting family for the holidays, or enjoying...
2024 Data Breaches Wrapped
It’s been a big year for big data breaches. Billions of records on millions of people have been exposed at...
How to Detect Signs of Identity Theft
When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a problem. A missing bill or a mysterious charge on...
How to Delete Yourself from the Internet
While you can’t delete your personal info from the internet entirely, you can take strong steps to remove it from...
SpyLoan: A Global Threat Exploiting Social Engineering
Authored by: Fernando Ruiz The McAfee mobile research team recently identified a significant global increase of SpyLoan, also known as...
How to Protect Your Social Media Passwords with Multi-factor Verification
Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts....