Featured Blogs
How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security
Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we’ve gone from seeing well-loved, but deceased, cultural...
Wildfire Ransomware Extinguished by Tool From NoMoreRansom
McAfee and Kaspersky Lab, partners in the project NoMoreRansom, are pleased to announce today the availability of a decryption tool...
8 Tips to Help Kids Break a Social Media Creeping Habit
Question: I never imagined allowing my daughters to begin dating would be such an emotional rollercoaster — thanks to social media!...
Travel Tech: How To Stay Safe When You Travel
I don’t think there are many more exciting experiences than holidays. No housework, no routines, no daily grind – just...
80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety
Let’s imagine you traveled back in time, smartphone in pocket. Let’s say a medieval peasant sees you using this strange...
Becoming an Experimental Marketer
A few years ago, Optimizely decided to try something different for the 2013 Dreamforce event, a developer and user mega-conference...
Tax Fraud Robocalls Can Amuse, but Don’t Become a Phishing Victim
Yesterday at work, I received a call on my cell phone while in a meeting and did not answer. The...
Identity Theft 101: Five Smart Tech Tips for College-Bound Kids
Starting college marks the first of many adulting firsts — first dorm room, first roommate, first no-curfew-on-a-school-night — indeed, there...
Send Your Kids Back to School with Mobile Safety in Mind
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming...
Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...