Featured Blogs
‘Whisper’ App: Teens Are Having a Blast but Parents May Gasp
Everyone loves a good secret. Tack anonymity to a whisper and the recipe for juicy fun spikes considerably. That’s the...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
‘SSL Death Alert’ (CVE-2016-8610) Can Cause Denial of Service to OpenSSL Servers
Recently we noticed a security patch has been published for the OpenSSL vulnerability called SSL Death Alert. As with other...
‘Secret Chat’ Messages Aren’t So Secret After All
The universal truth about secrets? They almost always tend to get leaked. This was the case for a cross-platform messaging...
‘Popcorn Time’ Ransomware Sure to Cause Indigestion
In early December the new ransomware “Popcorn Time” was discovered. It gives the victim the option of paying the ransom...
‘Police Ransomware’ Preys on Guilty Consciences
“Police ransomware” is big business, generating millions of euros for organized criminal groups. In May, at Europol’s headquarters in The...
‘Operation Oceansalt’ Delivers Wave After Wave
In the latest findings from the McAfee Advanced Threat Research team, we examine an adversary that was not content with a single campaign, but launched five distinct waves adapted to their separate targets.
‘McAfee Labs Threats Report’ Delves Into Dangers of Data Loss
This blog post was written by Rick Simon. Data is leaking out of your organization: accidentally or intentionally, by internals...
‘Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product
Eoin Carroll, Charles McFarland, Kevin McGrath, and Mark Bereza contributed to this report. The Internet of Things promises to make...
‘FakeInstaller’ Leads the Attack on Android Phones
Android.FakeInstaller is a widespread mobile malware family. It has spoofed the Olympic Games Results App, Skype, Flash Player, Opera and...
‘Evoltin’ POS Malware Attacks via Macro
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware....
‘DHL’ SMS Spam Distributes Android Malware in Germany
One of the most common methods for distributing PC malware is the use of email spam messages that pose as...
‘Bioskits’ Join Ranks of Stealth Malware
We have seen many discussions of the MyBios “Bioskit” discovered at the end of 2011. MyBios was the first malware...
‘Banking’ Malware Dridex Arrives via Phishing Email
Microsoft Office scripting malware has become more and more common and aggressive lately as malware authors constantly develop new techniques...
‘Android/NotCompatible’ Looks Like Piece of PC Botnet
A lot of recent attacks on Android users are attributed to fake websites of popular applications such as Cut the...
"Operation Aurora" Leading to Other Threats
Operation Aurora has received a lot of attention over the past couple of days. To recap, Google, Adobe, and many...
$625 Million Stolen in Latest Crypto Attack: 5 Tips on How to Use Digital Currency Safely
Cryptocurrency is all the rage these days and it doesn’t seem to be slowing down any time soon. As more...
#WSPD Creating hope through action with The Jordan Legacy
*TW: Mentions Suicide Our passion for protecting people doesn’t stop with online safety. We deeply care for our people, their...
#WorldKindnessDay: How to Help Kids Tap into their Superpower of Being Kind
“There is no small act of kindness. Every compassionate act makes large the world.” —Mary Anne Radmacher, American writer,...
#WhyCybersecurity
This blog was written by Bruce Snell. “The sky above the port was the color of television, tuned to a...
#Verified — Worth the Risk?
In the social media world, a little blue checkmark next to a username is a sought-after status symbol. Celebrities, global...
#Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to...
#PrivacyAware: Will You Champion Your Family’s Online Privacy?
The perky cashier stopped my transaction midway to ask for my email and phone number. Not now. Not ever. No...
#McAfeePride2022
In the spirit of #PrideMonth, McAfee hosted month-long celebrations across the world. One of these was a live event hosted...
#HDM: Decoding the Latest Wave of Teen Cyber Slang
Do you get a little confused looking through your teen’s Instagram or Twitter feed lately and seeing a crazy amount...
#DeleteFacebook: Do You Really Need To?
Is it time to #deleteFacebook? Facebook’s long line of dramas has many of us rethinking our dependence on Mark Zuckerberg’s...
#CyberAware: Will You Help Make the Internet a Safe Place for Families?
Don’t we all kinda secretly hope, even pretend, that our biggest fears are in the process of remedying themselves? Like...