Featured Blogs
Malicious PowerPoint Documents on the Rise
Authored by Anuradha M McAfee Labs have observed a new phishing campaign that utilizes macro capabilities available in Microsoft PowerPoint....
How to Help Seniors Spot Online Job Scams
Sadly, online job scams targeting older adults have been an issue for years. However, in a pandemic job market, cybercriminals are working overtime...
Top 10 COVID-19 Scams: How to Stay Protected
The COVID-19 pandemic flipped the world on its head in so many ways. Offices and schools stood empty while living...
Smartphone Security: Five Steps Beating and Blocking Robocalls
Some scams can make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. Not only are they annoying, but they can also hit you in the pocketbook. In the U.S., unwanted calls...
Android malware distributed in Mexico uses Covid-19 to steal financial credentials
Authored by Fernando Ruiz McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank...
How Fraudsters Are Fooling Users With This Proof of Vaccination Phishing Scam
You open your laptop and see an email from a healthcare organization that you don’t recognize. The subject line reads “URGENT –...
Phishing Android Malware Targets Taxpayers in India
Authored by ChanUng Pak McAfee’s Mobile Research team recently found a new Android malware, Elibomi, targeting taxpayers in India. The malware steals sensitive financial and private information via phishing by pretending...
Uber Data Breach and How to Protect Your Info
The Latest on the Uber Data Breach and Protecting Your Info You may have spotted the news last week that...
Can Your Wearable Health Monitors Be Compromised?
More senior adults are taking advantage of the array of wearable technology that helps them stay connected to healthcare providers and monitor their physical health and safety. But that newfound convivence comes with risk and, for many, the genuine fear...
T-Mobile’s data breach exposes the personal data of 40 million
T-Mobile, the popular US mobile phone service provider, recently confirmed a data breach affecting 7.8 million current customers and 40 million records from past or prospective customers. The...
4 Viral Apps Risking Your Personal & Smartphone Security
Mobile phones have gone through an incredible transformation since their inception in the 1970s. Now, the sheer number of applications is dizzying, as are their...
Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes...
Back-to-School: Privacy Worries in a Remote Learning World
As the new school year gets underway, many students will be returning to the classroom in-person, while others will opt...
6 Tips for a Safer and Easier Telemedicine Visit
We’ve all been there. It’s the middle of the night and you wake up to a sad and sniffly kiddo...
The Rise of Deep Learning for Detection and Classification of Malware
Co-written by Catherine Huang, Ph.D. and Abhishek Karnik Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
XLSM Malware with MacroSheets
Written by: Lakshya Mathur Excel-based malware has been around for decades and has been in the limelight in recent years. During the second half of 2020, we saw...
How to Protect Yourself From XLoader Malware
Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email,...
7 Safety Tips to Schooling in a Digital World
This fall, many students are headed back-to-school full time. However, just as workplaces now accommodate for remote work, schools are...
The New McAfee: A Bold New World of Protection Online
This news has been some time in the making, and I’m terrifically excited to share it. As of July 27th, we take a...
Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?
Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating...
It’s All About You: McAfee’s New All-Consumer Focus
This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that...
What is a VPN and Can it Hide My IP Address?
There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do...
9 Tips to Help Kids Avoid Popular App Scams
There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number...
My Journey from Intern to Principal Engineer
Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and...
How to Secure Your Smart Home: A Step-by-Step Guide
How many rooms in your home contain a smart device? From Peloton bikes to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...