Featured Blogs
Learn How to Spot a Phishy Email and Stay Safe
This blog post was written by Bruce Snell. One piece of advice I always give (after update, update, update) is...
Leaning into Change with the McAfee Family
With today’s current climate, many companies are building cultures and infrastructures to support working from home (WFH). Like most transitions,...
LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a...
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
Lazarus Resurfaces, Targets Global Banks and Bitcoin Users
McAfee Advanced Threat Research (ATR) analysts have discovered an aggressive Bitcoin-stealing phishing campaign by the international cybercrime group Lazarus that uses sophisticated malware with long-term impact.
Lazarus Cybercrime Group Moves to Mobile Platform
When it comes to describing cyberattacks, the word sophisticated is used a lot. Whether to explain yet another “advanced” campaign...
Latest Texting Slang Every Parent Needs to Know
At least once a year we update our texting chat acronyms (slang) list. This year the app Ask.Fm made that...
Latest SpyEye Botnet Active and Cheaper
On April 16, we found a Pastebin entry selling the latest version of the infamous SpyEye botnet (Version 1.3.48) for...
Latest Crypto Vulnerability Leaks $320 Million: 3 Tips to Boost Your Crypto Confidence
Cryptocurrency has boomed in the last several years, with beginners and experts alike jumping into the industry. It’s proven now...
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets,...
Labs Paper Looks ‘Inside the World of the Citadel Trojan’
Zeus “banking” malware and its variants have been making headlines in recent months. One variant, the Citadel Trojan, has now...
Kraken Ransomware Emerges from the Depths: How to Tame the Beast
Look out, someone has released the Kraken — or at least a ransomware strain named after it. Kraken Cryptor ransomware...
KRACKs: Five Observations on WPA Authentication Vulnerability
KRACKs are in the news. McAfee has already discussed these key reinstallation attacks that affect Wi-Fi setups in two posts:...
KRACKs Against Wi-Fi Serious But Not End of the World
This blog was written by Brook Schoenfield. On October 12, researcher Mathy Vanhoef announced a set of Wi-Fi attacks that...
KRACK Hack Threatens Wi-Fi Security – What it Means for You
If you grew up before, or even during the 90s, you were familiar with a world of cords. A cord...
Know Your Superpower: Brenda’s McAfee Journey
Our How I Got Here series spotlights the stories of McAfee team members who have successfully grown their careers. Read more about...
Know Where They Go: YouTube Basics for Parents
If you can hear your kids hysterically laughing in another room, chances are they—and their friends—are watching videos on YouTube....
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
