Featured Blogs
College Basketball Finals Shouldn’t Result in March Mayhem: 4 Security Tips to Stay Safe
March is in full swing, which can only mean we’re about to enter the mayhem that is the college basketball...
Cold Wallets, Hot Wallets: The Basics of Storing Your Crypto Securely
If you’re thinking about crypto, one of the first things you’ll want to do is get yourself a good wallet. ...
Code Execution Technique Takes Advantage of Dynamic Data Exchange
Email phishing campaigns are a popular social engineering technique among hackers. The idea is simple: Craft an email that looks...
Cloud Clustering Vulnerable to Attacks
The authors thank John Fokker and Marcelo CaroVargas for their contributions and insights. In our upcoming talk at the Cloud...
Cloud Adoption Is in the Forecast
This blog was written by Richard Steranka. McAfee recently released new research on the quickening pace of enterprise cloud adoption....
CLOP Ransomware exploits MOVEit software
Authored by: Abhishek Karnik and Oliver Devane You may have heard recently in the news that several organizations, including banks,...
Clop Ransomware
This new ransomware was discovered by Michael Gillespie on 8 February 2019 and it is still improving over time. This...
Clicks & Cliques: How to Help Your Daughter Deal with Mean Girls Online
According to a new report released by the National Center for Education Statistics (NCES), mean girls are out in force online....
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to...
Clickbait and Switch: How AI Makes Disinformation Go Viral
Bad news travels quickly. Or so goes the old saying. Yet we do know this: disinformation and fake news spread...
Clever Phishing Attacks Target Google, Yahoo, DHL Customers
Last week McAfee Labs received a phishing page that efficiently uses the CSS format of the Gmail login page and...
Clever Billing Fraud Applications on Google Play: Etinu
Authored by: Sang Ryol Ryu and Chanung Pak A new wave of fraudulent apps has made its way to the...
CIOs: You need to have the cloud talk with your staff
CIOs, it is time to have a frank and open discussion with your staff. This conversation may be difficult or...
Cidox Trojan Spoofs HTTP Host Header to Avoid Detection
Lately, we have seen a good number of samples generating some interesting network traffic through our automated framework. The HTTP...
Christmas Shopping 2020
How To Stay Safe While Shopping Online This Holiday Season I’m pleased to report that I’ve achieved a number of...
Chipotle’s Marketing Account Hacked: Protect Yourself From Phishing Lures
Over the past few years, food delivery apps have made it easy for people to get their favorite cuisines brought...
Chip and PIN Credit Cards: More Secure, But Not Perfect
Not too long ago I discussed a big change coming to your credit and debit cards—the Chip and PIN system....
Chinese Worm Infects Thousands of Android Phones
Last weekend, it was reported in China that an SMS worm was wildly spreading among Android mobile phones, with more...
Chinese Trojan Hooks Macs, iPhones
“Distrust and caution are the parents of security”–Benjamin Franklin A recent threat targeting Chinese users of Mac OS X and...
Chinese Cybercriminals Develop Lucrative Hacking Services
Underground cybercrime profits in China have likely already exceeded US$15.1 billion (100 billion Chinese yuan); caused more than $13.8 billion...
Children’s Charity or CryptoMix? Details on This Ransomware Scam
As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well....
Check up on Your Virtual Safety: Tips for Telehealth Protection
Check up on Your Virtual Safety: Tips for Telehealth Protection In a poll conducted by the Canadian Medical Association, nearly...
Check Out the McAfee Most Dangerous Celebrity 2020
Attention Streamers: Check Out the McAfee Most Dangerous Celebrity 2020 List During COVID-19, people stuck inside have scoured the internet...
Cheating and Bullying: It’s a Bigger Problem than You Think!
The whole purpose of your “youth” is to grow and learn. It’s time to take in lots of information, so...
Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in...
ChatGPT: A Scammer’s Newest Tool
ChatGPT: Everyone’s favorite chatbot/writer’s-block buster/ridiculous short story creator is skyrocketing in fame. 1 In fact, the AI-generated content “masterpieces” (by...
ChatGPT’s Impact on Privacy and How to Protect Yourself
How To Manage Your Privacy When Using ChatGPT or Other Generative AI Love it or hate it, generative artificial intelligence...