Featured Blogs
Unmasking AsyncRAT New Infection Chain
Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...
The Benefits of Protection – The Case for Digital Wellness in the Workplace
This is the first in a series of three articles covering digital wellness programs in the workplace. Here we take...
’Tis the Season for Holiday Scams: 5 Common Schemes to Look Out For
This time of year, the air gets chillier and a bit cheerier for everyone … including online scammers. Holiday scams...
Advances in Our Use of AI Keep You Even Safer Online
AI is on your side. In fact, it’s kept you safer online for some time now. Now that scammers and...
McAfee 2023 Hacker Celebrity Hot List – Why Hackers Love Ryan Gosling so Much
Hackers love Ryan Gosling. In fact, hackers use his name as bait more than any other celebrity. With that, the...
How to Look Out For Scams on Facebook Marketplace
Reels of another kind rack up the views online. Stories about Facebook Marketplace scams. Recently, TikTok’er Michel Janse (@michel.c.janse) got...
Digital Strategies to Safeguard Your Child from Upsetting and Violent Content Online
Amidst the recent heartbreaking events in the Middle East, parents now face the challenge of protecting children from the overwhelming...
Cryptojacking – Stop Hackers from Making Money Off You
Your pain is their gain. That’s how things go in a cryptojacking attack. Cryptomining is the utilization of computers to...
How to Win the Battle Against Deepfakes and Malware
As AI deepfakes and malware understandably grab the headlines, one thing gets easily overlooked—AI also works on your side. It...
How much do you count on the internet every day?
Maybe you do armloads of shopping on it. Maybe you skip going to the bank because you can tackle the...
How to Protect Your Mobile Device From Loss and Theft
The unfortunate reality of our digital era is that devices are lost, misplaced, or stolen every day. A mobile device without password protection is a gold mine for anyone with malicious intent.
123456 Is Not an Acceptable Password
A common misconception is that a password only needs to be memorable. Whilst this is a helpful trait, it does a disservice to the importance of having a secure series of characters. This guide will walk you through why "123456" is not an acceptable password.
Hold onto Your Phone, and Your Wallet – The Top Five Text Scams
Getting a text message is a lot like someone calling out your name. It’s tough to ignore. Delivery notifications, messages...
Could ChatGPT Be The Best Thing That’s Ever Happened To Your Family?
I have a confession to make – I so wish ChatGPT was around when my kids were younger. I realise...
Exploring Winrar Vulnerability (CVE-2023-38831)
Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...
RUOK Day – How to Get Help Online When You’re Not Feeling OK
I’m such a fan of RUOK? Day. Started in 2009, it’s an Australian non-profit suicide prevention that is all about...
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...
ChatGPT’s Impact on Privacy and How to Protect Yourself
How To Manage Your Privacy When Using ChatGPT or Other Generative AI Love it or hate it, generative artificial intelligence...
The Future of Work: How Technology & the WFH Landscape Are Making an Impact
As of the writing of this article, the height of the pandemic seems like a distant but still vivid dream....
McAfee’s New Privacy & Identity Guard Launches at Staples Stores
Your privacy means everything. And your identity too. The launch of McAfee Privacy & Identity Guard will protect them both. ...
USB Drives – Protecting Your Humble Workhorse from Malware and Loss
The humble USB drive—the workhorse of students, professionals, and everyday computer users. No wonder hackers put USB drives in their...
Secret Selfies: Can Phones Take Pictures and Videos of You Without Your Knowledge?
It’s a longstanding question: can your phone really take selfies without your knowledge? The answer is yes, but with a...
Online Job Scams – TikTokers Tell Their Stories, with a Warning
We reported earlier this year, a fresh rash of online job scams continue to rope in plenty of victims. Now,...
Peeling Back the Layers of RemcosRat Malware
Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....
On Public Wi-Fi, a VPN is Your Friend
You can almost feel it in the air. Wi-Fi is everywhere. And if you tap into public Wi-Fi, do it...
A Traveler’s Guide to International Cybersecurity
Have you ever lost your suitcase on vacation? You arrive at baggage claim, keeping your eyes peeled for your belongings....
Crypto Scam: SpaceX Tokens for Sale
Authored by: Neil Tyagi Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...