Security

Be up to date with the latest threat on the Internet. Find out about various viruses, malicious software, ransomware playing around. Learn tips and guides from the different channels about security.

The New McAfee: A Bold New World of Protection Online


This news has been some time in the making, and I’m terrifically excited to share it.   As of July 27th, we take a decisive step forward, one where McAfee places its sole focus on consumers. People like you. This marks the day we officially divest our enterprise business and dedicate ourselves to protecting people so they can freely enjoy […]
The post The New McAfee: A Bold New World of Protection Online appeared first on McAfee Blogs.

Smart borders: Hubs of mass surveillance


Automated border-crossing systems are designed to be convenient. But what are we giving up along the way?
The post Smart borders: Hubs of mass surveillance appeared first on Home of internet privacy.

Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and Protocols


Architected for the cloud-first and remote-first deployments, MVISION Cloud Firewall secures access to applications and resources on the internet, accessed from every remote site and location, through a cloud-native service model. The solution inspects end-to-end user traffic – across all ports and protocols, enabling unified visibility and policy enforcement across the organizational footprint. Powered by […]
The post Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and Protocols appeared first on McAfee Blogs.

Reviewing An Ugly Truth | Avast




New York Times reporters Sheera Frenkel and Cecilia Kang have been covering the trials and tribulations of Facebook for the past several years, and they have used their reporting to form the basis of their new book, An Ugly Truth: Inside Fa...

Crypto Exchange Scams | Avast




You may already have won! How many scams have begun with these words? 
There is a new breed of scammers gaining popularity, thanks to the wild swings in the cryptocurrency market. Avast researcher Matěj Račinský has tracked three diff...

Tech Support Scammer Language | Avast




Have you ever gotten a call from an unknown number claiming that there’s a serious problem with your computer? It’s likely you have — these types of calls, called tech support fraud, are more common than they ever have been before. Scammers...

Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems?


Co-written with Northwave’s Noël Keijzer. Executive Summary For a long time, ransomware gangs were mostly focused on Microsoft Windows operating systems. Yes, we observed the occasional dedicated Unix or Linux based ransomware, but cross-platform ransomware was not happening yet. However, cybercriminals never sleep and in recent months we noticed that several ransomware gangs were experimenting […]
The post Babuk: Biting off More than they Could Chew by Aiming to Encrypt VM and *nix Systems? appeared first on McAfee Blogs.

Cyber Shield 21 | Avast




Earlier this month, I had the unique opportunity to observe the National Guard conduct its cybersecurity exercises at Cyber Shield 21. This is perhaps the largest training effort of its kind, with more than 800 people across the U.S. taking...

It’s All About You: McAfee’s New All-Consumer Focus


This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that mean for consumers? It means that McAfee will be able to focus 100% of our talent and expertise on innovation and development that directly enables and improves the products and services that protect you and your family.  It’s the right time to take […]
The post It’s All About You: McAfee’s New All-Consumer Focus appeared first on McAfee Blogs.

7 ways to reduce or limit your screen time


Addicted to your phone? Learn how to reduce and control your screen time, when it’s on iOS, Android, or your computer.
The post 7 ways to reduce or limit your screen time appeared first on Home of internet privacy.

What is a VPN and Can it Hide My IP Address?


There’s a lot of misinformation about Virtual Private Networks, what they do, and the security benefits they offer. For this article, I’d like to do some myth-busting about how a VPN actually works and why you should use one.  What is a VPN and how does it protect me?  A VPN is an app that you install on your device to help keep your personal data safe as you browse the internet   You may […]
The post What is a VPN and Can it Hide My IP Address? appeared first on McAfee Blogs.

Good news! I’m getting a salary increase!

It seems my boss here at “Grahamcluley” has decided that I deserve a wage increase. This is not only terrific news for my bank balance, but also terribly exciting as I never knew I even had a boss – let alone that my company had a human resources depar...

9 Tips to Help Kids Avoid Popular App Scams


 There’s a lot of conversation going on right now around digital apps; only it’s not about TikTok or Twitch. Instead, it’s about the spike in the number of app scams taking place every day—many of them impacting younger consumers.  In a recent report from The Washington Post, nearly two percent of the apps downloaded from the Apple store in a single day were scams costing consumers an estimated $48 million. A similar report this week in Tech Republic estimates more than […]
The post 9 Tips to Help Kids Avoid Popular App Scams appeared first on McAfee Blogs.

Apple Hide My Email | Avast




We’re continuing to analyze and review the upcoming privacy features which will be included in Apple’s iOS 15 and Monterey OS, which will be released later this year. As we've previously mentioned, some features will be included free of cha...

Top 6 deepfake apps: Are they safe?


Sure, it’s fun to see your face in a blockbuster film, but you might be giving away more than you realize when using deepfake apps.
The post Top 6 deepfake apps: Are they safe? appeared first on Home of internet privacy.

How to be safely connected while travelling?


With so many people on the go, cybercriminals are back in business, too. A quick refresher is necessary to ensure that you stay safely connected during your summer travels.
The post How to be safely connected while travelling? appeared first on Panda Security Mediacenter.

Redundancy for resilience: The importance of layered protection in the cloud

At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. The global pandemic means more work is being […]
The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.

My Journey from Intern to Principal Engineer


Written by Shuborno, Principal Engineer At McAfee, architects and engineers continuously have opportunities to make decisions that impact customers and propel exciting and meaningful careers. They also work with leaders focused on supporting their learning and growth. These truths have been constant and driving forces for me throughout my 15+ years with the company. Today, […]
The post My Journey from Intern to Principal Engineer appeared first on McAfee Blogs.

How to Secure Your Smart Home: A Step-by-Step Guide


How many rooms in your home contain a smart device? From security cameras to showerheads with Bluetooth speakers, smart home technology is rapidly making its way into every room in every household. In fact, the number of smart households (those that contain smart home technology) in the U.S. is expected to grow to 77.05 million by 2025. But with new technology comes new challenges.   Many product designers rush to get their smart devices […]
The post How to Secure Your Smart Home: A Step-by-Step Guide appeared first on McAfee Blogs.

Pegasus And Spyware | Avast




Earlier in July, a group of security researchers revealed that they had been working together to uncover a widespread surveillance of journalists, politicians, government officials, chief executives, and human rights activists. The tool of ...

Smashing Security podcast #237: NuNa, NuNu, NaNa

Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a “Freedom Phone” be trusted? And a ransomware-hit law firm demonstrates how not to keep its cust...

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety


Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the […]
The post Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety appeared first on McAfee Blogs.

Increase VPN speeds by over 400% with VPN Accelerator

ProtonVPN has a long history of developing new solutions to complex and difficult problems, including ways to defeat attempts to block VPNs and advertisers tracking users across the internet. As a company created by scientists who met at CERN, we have a strong culture of research and development, and we have recently leveraged this to […]
The post Increase VPN speeds by over 400% with VPN Accelerator appeared first on ProtonVPN Blog.

Top 5 Security Tips for SMBs | Avast




I have the pleasure of leading the Avast Red Team, a specialized unit dedicated to protecting our business applications, products and network infrastructures. You could say my team is all business, literally. We keep our clients’ data safe ...

Are advertising unique IDs anonymous?


If you have apps with advertisements, you are at risk of being de-anonymized by data brokers. Here is how your confidential data could be unmasked.
The post Are advertising unique IDs anonymous? appeared first on Panda Security Mediacenter.