Featured Blogs
Ease of Buying Ransomware Fuels Affiliate Program
For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of...
Don’t Rely on the Password Reset
Think about your keychain. It probably holds the necessities: car keys, home keys, work keys, miscellaneous keychains you bought on...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
An Aware Child is Safer Online
A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you may recall, our...
Be Cautious When Using Wi-Fi
The proliferation of mobile devices means that we can work or play online from almost anywhere, so it’s no surprise...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
Five Things I Don’t Like About Cloud Security for Homeowners (and One Thing I Do)…
For a while now I’ve been working to define an architecture for securing homes from cyber threats – not just...
McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
This blog post was written by Rick Simon. McAfee today released the McAfee Labs Threats Report: May 2015. Along with...
Bringing Up the Next Generation of Digital Citizens
Nearly every automobile driver has some understanding of the ‘rules of the road,’ from using your seatbelt to signaling before...
What is a Cache?
Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should...