Featured Blogs
Deepfake Defense: Your 8-Step Shield Against Digital Deceit
A disturbing story out of western Spain spotlights challenges of technological evolution. Unwitting children and teenagers were victims of users...
Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’
The McAfee Advanced Threat Research (ATR) Team has closely followed the attack techniques that have been named Meltdown and Spectre...
Deconstructing Amadey’s Latest Multi-Stage Attack and Malware Distribution
Authored by By Yashvi Shah McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at...
Deadly Digital Dares: The Blackout Challenge on TikTok
The social network TikTok is chockfull of interesting, fun, laugh-out-loud videos shared by creators worldwide. Kids, as well as parents,...
DDoS Attacks in the Netherlands Reveal Teen Gamers on Troublesome Path
At the end of January, the Netherlands was plagued by distributed denial of service (DDoS) attacks targeting various financial institutions,...
Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you...
Data Shows You’ll Encounter A Deepfake Today—Here’s How To Recognize It
The internet is brimming with content designed to entertain, inform—and sometimes deceive. The latest tool in a cybercriminal’s arsenal? Deepfakes....
Data Privacy Day: Respecting Privacy, Safeguarding Data and Enabling Trust
This blog post was written by Bruce Snell. At McAfee, we are happy to be part of Data Privacy Day....
Data Breach Exposes 3 Billion Personal Information Records
News of a major data breach that could affect nearly three billion records comes to light from a somewhat unusual source — a class-action complaint filed
DarkSide Ransomware Victims Sold Short
Over the past week we have seen a considerable body of work focusing on DarkSide, the ransomware responsible for the...
Darkshell DDOS Botnet Evolves With Variants
Darkshell is a distributed denial of service (DDoS) botnet targeting Chinese websites. It was found in 2011 and was first...
Darknet Markets Will Outlive AlphaBay and Hansa Takedowns
On June 20, law enforcement took over the Hansa marketplace after investigations that began in 2016. On July 5, police...
Dangerous Digital Rituals: Could Your Child be Sleep Deprived?
You’re not wrong if you suspect your kids are spending far more time online than they admit. Where you may...
Cybersecurity to become a major employment generator – Are you ready?
Hi There! In November 2014, the United Nations Organization (UNO) declared 15th July as World Youth Skills Day. The purpose...
Cybersecurity Tips for Students Returning to School
Almost every teenager in the United States (approximately 96%) reports using the internet daily. As students prepare to return to...
Cybersecurity Supermom: Take Charge and Become the IT Pro in Your Home
Wouldn’t it be great if we all had our own IT department at home? Think about it. If we had...
Cybersecurity Suffers Due to Human Resources Challenges
The cybersecurity industry is in a state of disrepair. Growing human resource problems put the efforts to secure technology at...
Cybersecurity Awareness Month: Taking Charge of Your Safety Online
When it comes to crime, what do people worry about most? Having their car stolen? A break-in while they’re not...
Cybersecurity Awareness Month: If You Connect It, Protect It
Cybersecurity Awareness Month: If You Connect It, Protect It October is Cybersecurity Awareness Month, which is led by the U.S....
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart
Cybersecurity Awareness Month Helps Us All be #BeCyberSmart October is Cybersecurity Awareness Month, which is led by the National Cyber...
Cybersecurity 101: Top Takeaways from Our Back to School Study
The end of summer is almost here, which means both parents and their kids are starting to gear up for...
Cybercrooks are SMiShing for your Apple Credentials
This blog was written by Bruce Snell. SMiShing is another one of those fantastic terms on the internet that drives...
Cybercriminals Test Malware Through a Comment on Britney Spears’ Instagram Page
Oops, Trojan malware did it again. This time, it’s targeting popstar Britney Spears’ social media, specifically, her Instagram page. However,...
Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks
In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of...
Cybercriminals Disguised as Apple Are After Users’ Personal Data
With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends...
Cybercriminals Crack into 360 Million Old Myspace Accounts
It’s easy to create online accounts, and it’s just as easy to forget them. Remember Myspace? The early social media...
Cybercriminals Claim They Have ‘Millions’ of iCloud Credentials, but Likelihood Is Low.
A lot of people love to play poker for the thrill and entertainment of sheer luck. For some, however, it’s...
