You're scrolling through Facebook and receive a message notification. You open it and see it's from Volkswagen, claiming that the company will be giving away 20 free vehicles before the end of the year. If you think you're about to win a new car, think again. This is likely a fake Volkswagen phishing scam, which ...
Read Blog
2018 was a wild ride when it came to cybersecurity. While some hackers worked to source financial data, others garnered personal information to personalize cyberattacks. Some worked to get us to download malware in order to help them mine cryptocurrency or harness our devices to join their botnets. The ways in which they exact their ...
Read Blog
Your home screen is just a matrix of numbers. Your device loses its charge quickly, or restarts suddenly. Or, you notice outgoing calls that you never dialed. Chances are your smartphone has been hacked. The sad truth is that hackers now have a multitude of ways to get into your phone, without ever touching it. ...
Read Blog
In my last piece, I broke down the who, what, and how of cyberbullying, as most people are unaware of how the problem actually takes a variety of forms. With multiple types of cyberbullies and methods for digital bullying impacting kids today, the phenomenon’s effect on society is nothing short of powerful. In fact, according ...
Read Blog
Rockstar Games’ Red Dead Redemption 2 has struck a popular chord with many online gamers. Unfortunately, the Western-themed action-adventure game has also become a popular vessel for malicious activity among cybercriminals as well. Scammers are tricking gamers into giving up their personal information with phony “free” downloads of the online game, while simultaneously making a ...
Read Blog
We all share photos online: photos of our kids, photos of our trips, and photos of our meals. We think we are sharing memorable experiences with our friends and family, but are we sharing more with the public than we intend? What if hidden metadata could reveal dangerous details? In episode 20 of “Hackable?”, a ...
Read Blog
Pay-per-install, or PPI for short, is a type of software program that presents users with third-party offers while they are in the middle of another download. If a user clicks on the third-party advertisement, the software developer earns money from the download. One specific PPI program has caught the attention of our McAfee ATR team, ...
Read Blog