Featured Blogs
26 Billion Records Released in “The mother of all breaches”
Security researchers have discovered a massive data breach containing more than 26 billion records — a hacker’s trove of records...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community
Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...
No, Taylor Swift Won’t Send You a Free Dutch Oven — The New AI Cloning Scam
Taylor Swift wants plenty of good things for her fans — but a free Dutch oven isn’t one of them. ...
New Year, New Tech at CES — The Latest Protection for the Latest Tech
New year, new tech. That’s what hits the floor at the CES show each January in Las Vegas. Whether it’s...
How to Stay Safe in the Age of AI
We’ve seen how AI can create — and how it can transform our lives. What gets talked about less is...
6 Cybersecurity Predictions for 2024 – Staying Ahead of the Latest Hacks and Attacks
AI and major elections, deepfakes and the Olympics — they all feature prominently in our cybersecurity predictions for 2024. That’s...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...
How to Protect Yourself from QR Code Scams
Imagine paying $16,000 to park your car in a lot for a couple of hours. That’s what happened to one...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...